Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 06:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ptoszek.pl
Resource
win10v2004-20240802-en
General
-
Target
http://ptoszek.pl
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 68 discord.com 62 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{828F6DF5-09AD-4140-9B16-3E7488257767} msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 404 msedge.exe 404 msedge.exe 4408 identity_helper.exe 4408 identity_helper.exe 5796 msedge.exe 5796 msedge.exe 6080 msedge.exe 6080 msedge.exe 6056 msedge.exe 6056 msedge.exe 6056 msedge.exe 6056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5484 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5936 CredentialUIBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 384 404 msedge.exe 84 PID 404 wrote to memory of 384 404 msedge.exe 84 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3236 404 msedge.exe 86 PID 404 wrote to memory of 3480 404 msedge.exe 87 PID 404 wrote to memory of 3480 404 msedge.exe 87 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88 PID 404 wrote to memory of 3704 404 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ptoszek.pl1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13ad46f8,0x7ffe13ad4708,0x7ffe13ad47182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4584 /prefetch:82⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6452 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7064 /prefetch:82⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7444 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7524 /prefetch:12⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8280 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8548 /prefetch:12⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=printing.mojom.PrintCompositor --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --service-sandbox-type=print_compositor --mojo-platform-channel-handle=7876 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=8260 /prefetch:62⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14247685173928661987,1858144661295273159,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x524 0x4381⤵
- Suspicious use of AdjustPrivilegeToken
PID:5484
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainer -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
1024KB
MD53680d862474f5af9bbcd440e0bef94c1
SHA1d7efa5887f139c3aa633bcc759092d1abe01028d
SHA256aff07fd0d757945ed27cf0b9fd6d006e8f6eecb2de4d1cf5f9b568579f7b53c0
SHA51229f5b80014f81a29f1d908d0b7d514cd739c20d1502bb536fb3e859893d43a3856b1b61a2944035289d766e4d64c82b3ae3a0ba2c583bc72eab889a8dd7c57dd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD524870a176927934ed80d3e27e8978c1a
SHA1761d921e57068dbf2153149cd12bce3460db4095
SHA256d9ffcc5d5a1add4d3da1f773bb1ab10cb278d0c71f73b1ef0240d45190c2a2ad
SHA5121be22400aff84256b23b9e97e34be85e40e52a5c2e28bcfa164c45edb057c195dc51c34e708f9dfa6a6e273e573302cdbacc67408a39cc2985cf36eb0ad92cd2
-
Filesize
3KB
MD54c7ef5608ecac7cf1a0777b054a482f4
SHA133f2856e1747bf64a92cf1ac82e1c2260a646910
SHA25638de84bc7449b6a3e332948f41b13624d82fab978d750bab8730be3464735f7c
SHA51242426e029ea335e797193b015aab276e74164e40fea7c67bad9e56a80968263c13176951d89cd540b3740cb3a7b82e9a7a66c3fc460ac15c7ca44f8a0df68587
-
Filesize
3KB
MD5d8dd1459365b7eec172b6878255cca29
SHA1afdf069aba8ea96475a3b143a2c781306270ec94
SHA25691fe9b528d495bcc49766d34501397351af2407626590d493b7f6f107e9d6257
SHA512a9f8658be488e6f41369fa2809c8cd35e06639ccac618b2118cfa6f91e3cbc804afb423b332c78974f8365c6eab6534924abf4f20cb4dd65d3921797a2db55ee
-
Filesize
5KB
MD51a72a8d6385e0d0f405c965c23f03979
SHA1708acd3d3f50e935d921ef760434434e21ea0a04
SHA25695b0f373a82c28951e47f8acdb010a3d84e0f901eee1aed567c5f0d2d1c3e8cf
SHA51214090f7f56d0ec27d0061304fd17cc0686d2bb4ab0338225acb6f23fff07e328dedc0de6949867833766530bd6451f91e0e264297d8aa6f597179a5276dee053
-
Filesize
6KB
MD5a8fc40cfcd93077f4fd1174067e0cc13
SHA1f16666ed54c95dfabed74b8f5e360b40b2764544
SHA256dfd99d7c8226792f1f510a6e1870dd2166a4cfbcb5fe5107eae8758326ca065f
SHA512b2ab46866167f6e03f7bf569cfd50c47b43ee496055072885b071c8db167575a48f1eb83a4ed87cfb2e2cf1366e5a2835e76c0131b979d2d0b1b8b2cb989bb74
-
Filesize
9KB
MD53da843f7ef46bad2f0aae0b7bfc327ee
SHA1ab4ade62039e266b2b5b7a8c29c5ccbf7bc2b2e0
SHA256a286f383b22b5ae0565aa71e5bed7708f1cb0745929e515e1048687961ffcedf
SHA512acc700193430d361f7ddeb63501cf206c09ade98efe6ab320c228d030e246312296589d7e5e626c6fdd276f5a22b349d8b2a2cd0d566585143c27d76df601d23
-
Filesize
9KB
MD57c6d9ac77a18ef765383f6e955d32d43
SHA1214b55598ee7fcbd02e049b583464e64a50239e0
SHA256dfd3ebe07041da9880d065afd598036eed34eaadc9551cb6974e6d233f8dcf3a
SHA51238b58da40314b1e1e7f4a1b8d64e9b90c056dc65b047293cc5f416ab3fdc6260a65c25b556e329a85227f60af2b7e10971d4289281d444d9f7967fe51652ce15
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8c0d5e207a122351a58585698f57a21
SHA1ed6ceb659a3c730893aeb09b293d0c4b5c7a172d
SHA256b6771fc073f1d5b55a7cc64c280894738691cafbaa787bac257d7ab07c2eafa3
SHA51290a22f98b5eb3bf2315d60b62118c37dc1e67d4b31809250187a14737fd91d41c420d52cafc4ac1d3b9e9ff466dd63a21462e82dc364f3b294b1b041450bb9ab