Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
Jonita.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Jonita.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
VIP Forum.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
VIP Forum.exe
Resource
win10v2004-20240802-en
General
-
Target
VIP Forum.exe
-
Size
1.1MB
-
MD5
162c35f014cea15fc17213ec5d8a0b60
-
SHA1
df9a5575d5859a9327afe825ea6872dd04647fdf
-
SHA256
b8dfba0af9b771758e4327ccca83dc76e1708d7e7930437502eb4d813e619f12
-
SHA512
0aa6a09655e5a7eec90bdba3cced5ec129baf58d1c0de8ce0e77fb3b3b2648ff55934739e24cd2dd6aa469e5f18177deddb0ddc6a1d4d14822431bb78c107b36
-
SSDEEP
24576:KkQ0C7B36r7vtAfEPCp6iCXGJjYoFt7AsrFwlcVq2ULMH:K5BKdAcySXGzFNAMmcpULMH
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral4/files/0x0008000000023367-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation VIP Forum.exe -
Executes dropped EXE 2 IoCs
pid Process 3444 MKMP.exe 2144 Snuterz.exe -
Loads dropped DLL 7 IoCs
pid Process 2100 VIP Forum.exe 3444 MKMP.exe 2144 Snuterz.exe 3444 MKMP.exe 3444 MKMP.exe 2144 Snuterz.exe 2144 Snuterz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MKMP Agent = "C:\\Windows\\SysWOW64\\28463\\MKMP.exe" MKMP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\key.bin VIP Forum.exe File created C:\Windows\SysWOW64\28463\AKV.exe VIP Forum.exe File opened for modification C:\Windows\SysWOW64\28463 MKMP.exe File created C:\Windows\SysWOW64\28463\MKMP.001 VIP Forum.exe File created C:\Windows\SysWOW64\28463\MKMP.006 VIP Forum.exe File created C:\Windows\SysWOW64\28463\MKMP.007 VIP Forum.exe File created C:\Windows\SysWOW64\28463\MKMP.exe VIP Forum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIP Forum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MKMP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Snuterz.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\ = "Esasajla.Ipinohe class" MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\VersionIndependentProgID\ MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Elevation MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\LocalServer32 MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\FLAGS MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Version\ = "1.0" MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\0\ MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\0\win64 MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\HELPDIR\ MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\TypeLib\ = "{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}" MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD} MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Elevation\ MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\ProgID MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Programmable\ MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\VersionIndependentProgID MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\ MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\FLAGS\ MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\HELPDIR\ = "%SystemRoot%\\SysWow64\\wbem\\" MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\TypeLib\ MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\ = "ServDeps 1.0 Type Library" MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\LocalServer32\ MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\LocalServer32\ = "C:\\Windows\\SysWOW64\\sdchange.exe" MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Programmable MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A} MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\wbem\\servdeps.dll" MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Version MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\Version\ MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\0 MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\0\win64\ MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\TypeLib MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\VersionIndependentProgID\ = "sdchange.sdchangeobj" MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\FLAGS\ = "0" MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\HELPDIR MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\ProgID\ MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{760DE3E2-0710-4CD2-158D-2B65F1D6D0DD}\ProgID\ = "sdchange.sdchangeobj.1" MKMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0 MKMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07216ED8-6CE4-2EEE-6A9D-D9B426785B7A}\1.0\ MKMP.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 1696 msedge.exe 1696 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 5104 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5104 AUDIODG.EXE Token: 33 3444 MKMP.exe Token: SeIncBasePriorityPrivilege 3444 MKMP.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2144 Snuterz.exe 2144 Snuterz.exe 3444 MKMP.exe 3444 MKMP.exe 3444 MKMP.exe 3444 MKMP.exe 3444 MKMP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3444 2100 VIP Forum.exe 86 PID 2100 wrote to memory of 3444 2100 VIP Forum.exe 86 PID 2100 wrote to memory of 3444 2100 VIP Forum.exe 86 PID 2100 wrote to memory of 2144 2100 VIP Forum.exe 87 PID 2100 wrote to memory of 2144 2100 VIP Forum.exe 87 PID 2100 wrote to memory of 2144 2100 VIP Forum.exe 87 PID 2144 wrote to memory of 1696 2144 Snuterz.exe 90 PID 2144 wrote to memory of 1696 2144 Snuterz.exe 90 PID 1696 wrote to memory of 1384 1696 msedge.exe 91 PID 1696 wrote to memory of 1384 1696 msedge.exe 91 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 3476 1696 msedge.exe 94 PID 1696 wrote to memory of 1300 1696 msedge.exe 95 PID 1696 wrote to memory of 1300 1696 msedge.exe 95 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96 PID 1696 wrote to memory of 3584 1696 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\VIP Forum.exe"C:\Users\Admin\AppData\Local\Temp\VIP Forum.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\28463\MKMP.exe"C:\Windows\system32\28463\MKMP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\Snuterz.exe"C:\Users\Admin\AppData\Local\Temp\Snuterz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://reza-belive.blogspot.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8fad46f8,0x7ffa8fad4708,0x7ffa8fad47184⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:24⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:84⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:14⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:14⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:84⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:14⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:14⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:14⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:14⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,2653588496182614324,110120211427114599,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2692 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x470 0x4b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
712B
MD5efea3b68b9f0c74af0c00718e5f3e22f
SHA173e444bb1435bc8cb8015fd0599fa84516e56285
SHA256adad6af0788dfc8cee0a516f24e69f623ecba482aea493ccf1d14d45417e78ae
SHA5125cf68327ced35e2e502ac9e945c2e0045af95cafaa37d5abdbe5c75f69fab2480b423c4ae616d8b49cb6e21ffe0c56df5d3924fac84e39b68d8818ac135e9331
-
Filesize
5KB
MD516e0ca415447eacbee303a910bf34d11
SHA121ac22e00dec71c6608748baf7005f68c83c0314
SHA25678931bdc9c5efa61c5898f9361b611900bbcb88c6ae58e0ff71b3beca658e08d
SHA5124c4fc8733ceebac1379b84862801c2702ea5c870a4bf7bbaf907ba646d3f13cb0fd87551eaec561ff332235dbee02fa4a23ed6bd247b3b2aec569b4fa4805d44
-
Filesize
6KB
MD545e5532639ec64c2fa29fc27997b4b8f
SHA1d31843e6fa7562a443fe998ecac26d59c110ab6c
SHA2568d6872355a2a699042557395cc964fbad5dba190a4d24ec72281d22d98293c25
SHA51231f1ef7791f8d07dc00d79b49cfa5db8db3534d0c6718eac565475fc2eaa767032588b287b75ddc30538e9b75427c1a276534c7eb96c3c719e02e9ed16e074fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD553274641e5d7e5e633b6087fd35c36ef
SHA18fef37b25d31a9a2a6fdfd778434c16758da325c
SHA256f7ceccd7815a9ac58ec72d95f676c41ca03a9a46a0c088610176bfa4965ff4ad
SHA512b370a87be14b37c1b64931f3e063d835bace4563601d944b4c3328c6fbd412768abb17258cf458083226bcbb53b75feb603a49f3036f0e185389ddfaec0368c9
-
Filesize
4KB
MD5cb07753c45624238b4403480372be5db
SHA110af5bfbed599165d996470278f011728e866df7
SHA25663c3ed8cbe11314a2f2cd6ff50305bad98075be9e09d22e45b47af557a3388e7
SHA5122c72cca45ef924104c6892dd96f2e27a5d43bacc9f3eb0eeee24c871cc1bd1642d77734822d9d934f93a77c884fa1c682cf1ceddffe157a613978d9edd184312
-
Filesize
396KB
MD5a6517a923c489b3b8ad7b2edac49171e
SHA1d43a4f027609e3e5325ebf67a13ed1b2896f32bb
SHA2560425e1df375410c8abe84c8ca49c6964917aebaea747de23db14648449f4453f
SHA51284965285baee40eac41260ee55ad828b431e13b94190816d0d94c67b1d53e6add431e40bcf7c8c1dad8e337b6a09a00b782bc8b8551a9bb82b1e3372e70659bd
-
Filesize
457KB
MD542e2202ac32edb39ccf9979515018d85
SHA1c1e07fbe2fa759e2775d4dcf7de23a66d2422a1a
SHA256367b4028baf3df4a5f77169bd64c9ef8fd7968a4d6c852ae3f81a726f4b37222
SHA512a97d9e968b1f63dedba74999aabe6fd150aae985c1143d29b183cc0d663a45252c57494c3457136c5e500050c6af6c819f9ba7070b7d62300ede2e9a7c792768
-
Filesize
432B
MD598740aa80cabd8b5f1a785f2f0ec9b62
SHA1d1d44c19132f12a76d2322322438695faf1d3b38
SHA25657422b45a1a9b6c53f035d1d22cd15cd17e47f54ba492307bb828cc1c727ad12
SHA512e7c5df2e4a2e86d3e6c568bff5e26eee8baa72821b9f612a790f9a8396ecc748a52f1308e9eea3f5f82e05be2d5941ce3601ef189402c21b6e99d67958be02d8
-
Filesize
8KB
MD53da3041787b72a7909d9f6184ce6bc5e
SHA1fc7f00b8a1341b5341e2ba6f94ba85364bc90843
SHA25618e06896cc71e99b717cff8d68cba86fea3eba5087b93734f6418e53cadab5b3
SHA512150fa3f8eeec3621ac61eab0da3f2692dd776887ec0c1791404df3dd8784982563496e1e990217a99c4fd53c5d5d68e0574737879b72d78ab737033f1b08560a
-
Filesize
5KB
MD550d0bcf6b5a6b11d9e274ccefba3f02e
SHA157acf2a1236b7534f2db661a9d95aeadcd41aa2a
SHA256a5e5cf8b3133031f25db37fd13b029cdfc9d1588ca7f68041e52349f46cbbf5c
SHA512c0288f92c75f4a6ea45434e3960a3c5d8ed3d890121a3fd6da2449e1313db523224e301451d85a15ea8ee9b5c2fb3bf294ee90869a4d5608bcf48fa94458e938
-
Filesize
647KB
MD5a7b322839cedf8d56cb0a7dcdb50ab59
SHA1d27855e65f5d9e87666f39d2af694a0d75330a75
SHA256ba7362315c0608c9203c9d607fd85695fbc15f034ea40b3de7dd1abebd5859a3
SHA51286a416ae639ca458e56093d5c04f3406ac0389cf9a1047f714424ba89ffd047ca58e6927bc941d285d4db9e8a95e91e0d578be3038a83945b6af90586ea9f649
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae