Analysis
-
max time kernel
138s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
nuker.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
nuker.bat
Resource
win10v2004-20240802-en
Errors
General
-
Target
nuker.bat
-
Size
79B
-
MD5
46dd00fc980cdacb37e1c44c51e8f723
-
SHA1
9157002a2ff6e72727ee6bcad1e34b3c17d2ff74
-
SHA256
a4ad3b51094df9f984782a80b0941ec80e46d667efa9f9cbf1e837e78889c8e7
-
SHA512
ae15fa723e2a034d1d6139884bab9ab5251220a82547d7a0d611a6bcf52d75d84b0db4b40996b0ab90c90910a38d9b7b2d5ece0880273fb9bfadb7832e7775d0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\winnt32.exe NoEscape.exe File created C:\Windows\winnt32.exe NoEscape.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "182" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{A285D1E8-04AD-48C8-8EAC-4D075350359C} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 1100 msedge.exe 1100 msedge.exe 2532 identity_helper.exe 2532 identity_helper.exe 1672 msedge.exe 1672 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4352 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4876 1100 msedge.exe 98 PID 1100 wrote to memory of 4876 1100 msedge.exe 98 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 4304 1100 msedge.exe 99 PID 1100 wrote to memory of 5040 1100 msedge.exe 100 PID 1100 wrote to memory of 5040 1100 msedge.exe 100 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101 PID 1100 wrote to memory of 1104 1100 msedge.exe 101
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\nuker.bat"1⤵PID:4928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbe91b46f8,0x7ffbe91b4708,0x7ffbe91b47182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,16893255225575914781,18338871509267680684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1716
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1808
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa394e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4352
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\29d3fc33-71e9-49aa-873f-4c6b25b8b05f.tmp
Filesize5KB
MD579a07d42eaa9df0d976c040c63832c5c
SHA1ffd6f9f1b0d4a4cd165a653e1799db2456caab49
SHA256dff26cc87aee27a1a523b1001c1f0556db75dd444befdf794884d0c81beab6fb
SHA512e25973bea17de9244188a2401ffe8b3d8f043e7543b61a5322b444f90eca9e4babeacc02b4c52017112e0dc9bb19fc5d747af6b8a04625a585cb0f8673066829
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5f9b7c9a55f0016019a7e44598a187d47
SHA11db548ec5bc2fc53a0850f9495b6a160ce1270ce
SHA256a20de702d79488ef413439487faa74c5f93a6d47703074fc9451d41a4a9411e5
SHA5121a42425be144bd24e00ba30e314ae097607c223d760f898d14e40aff55db70c5ed26e8f90c6561ee4c2389838c41b588b6d514e8698c543b1968da04090a24c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5679978f62de78bbc211ca426e7142e1d
SHA1b4524ff29147349dc308f7cab9ac2f1633458e89
SHA25625f8b021a843b38b0c60f791b7c8ab350ff7a2eb203819c7423626f87e8edffe
SHA5123c050921b4929c69ee6c25b1d840a230b4c1d3c3babc49c7cf7615ccad084d95d4456dfa12483050af18213a3d7e6faefba22f0b31fef7816dad7129ee836184
-
Filesize
2KB
MD5e859d9ca7161edbf0a4603f2307d489a
SHA1c56cae947f0bc41abd45179cf79673f1da934710
SHA25651fa883a2f63f66b94e9cd651dcab783f4cb11abb720f162dbe3c2d93ff017c1
SHA512ecc04c066561e36d9e75967d84c7cbb071cd9f9b2666c1a3fc94fd16ef80093b381ea2dae2fadf1b5300acdd1b37ec29cc0bab15e635a09d13abbfa04fdbf92d
-
Filesize
7KB
MD59414b4cbbadab3746cabd5586848d278
SHA16865d05e9c5ab9bda5805df276e34be7c79f5313
SHA25666bbf4be97b590ac7baf4f65c4aa2859bc34a7bea6563c1c8c736f54fc8d59c6
SHA512822d0a9408ee486e411324143e0706ee96f653a9dd859b5f33678099f2c6cb0f4c42f727a876e3b2e6f704ab6649951a48e2f8f1d45d06d5da928a48f45354e7
-
Filesize
7KB
MD582aa67077cb93342805ba901c89aea7e
SHA12e1e0396385d97f87aa1e9e7a337a0621dae418a
SHA2561ad982924d1c74f223ef5359b0346fd7e01b86ed83da9ac69c8b88620d1cab13
SHA51239e39d0d9b8c1046331f3d2d6045775e20238a0809cb6fc870b427c8df3f1db792a8ab93c4a2694402fb2f16680de57dc8f26be0c2b42856fb52ae185349f182
-
Filesize
7KB
MD559444d015fdb9f2e6d08c247fbb6d2d1
SHA1daa1e1af5b8669493f83d3760f81788d1139df2b
SHA256ac30b68ae180c9732f943b9622fecc03bf2a90c8164cb7c75306177e046e9281
SHA51223902b55481069902a5722c5c622039640c7c4cb77d57f35a4749efca1532473f261102d1c7b17a8dbf2c2fd4026cf40237e5244f3cab0a4b07c0adcbf64307f
-
Filesize
7KB
MD5adfadc65b9bd0c96549adb5a12d30a79
SHA162bf288568802479813549b1f2a7db70273fa0a9
SHA256ac6cbd0a6e4ced1c9d58f3964d85e011575de25eb32b567d42ed9e17d908a67a
SHA51224af9be87f50c2dbeeb55cdc122c371797b24c0210694998b99f45e6056c3d8a818e5352c9cdd442dd32117664761f0152d7ef54248f64fa1040394af333a85e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5f3d439541c53e6e74392a9382ad231fe
SHA1a2272b6eba719de4a239b22a70a919f6a1a58e8e
SHA2566f506db06737c6b487aa14f36b71952ce146d66ddbbf567f8a17742e398ca6c2
SHA512d1fa4b184d89e373a06a378c352cd5b054273d139504a545c73e12570585db449fd9838cd6f84601de8b6358e06af31b9f6aea4587c29678b610fc02646b97bb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58f25a.TMP
Filesize48B
MD505c60a7389ab54718411f3805a9e32eb
SHA17bdb3a991815a1ff404e902fe7e951e28b7a70dd
SHA2561c8f57ec0b02c807ca71d4b09988238f8eb0e543d71f3b95466400bfead554ce
SHA512ef4d8b3b3776de1dc9094d459205d1b08da18c7407cd5b055288548e347120e27bc2d83c65782681fca79483912cfccef2f0fb132d7af96edfc94aa496618877
-
Filesize
1KB
MD5c3dc55eb80d0fc32051b619e22e65c29
SHA1146ae332bba49eb430a93b56f5f84bdc3d3e878e
SHA2562e84e53375eb96a9db5724770c2b07e06744878d3f785de8be39e869a5a44eb3
SHA512d4dd0cf45295324edaced727f0dd89bd80fa5663511ec3f52c34f25f20d0472a8ab2ee2c8b3c4e790f5331b29d487106fec69f400e99a32d5ab5bc4ef8f814ef
-
Filesize
1KB
MD54b04206ab9d621d34392bf8002a965cd
SHA1556be777dff70dfb7094687a04ec8116a24bad60
SHA2564a393fb48d9584eb409ec8269b7b491a9ae6d743dde489e2f16619e0290c52fa
SHA512d535e73673953f72d5b48d59f7a90cb85a9dadf204e53848a528f220d028e8c842d001fa1db00694c0f184877ee5e84f7e946548c3dab317725e75e21991b976
-
Filesize
537B
MD535014339895ae6406aaf9903f95a4232
SHA15c7295370f9494f1878eb75a79a35207a8f9b290
SHA256a6ff01549f84c9165c184488cb4f209da396e139d1e11c23ce9cfba689c5b0ca
SHA512f4f7de695d82e2df4ff6dff8bd73d52d0b29067f9c32ef97101cdc56c86c6bf0387e844e8b4fe4c50e3be62f62ea14808b98189b31f7b6969461263fe36df337
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c78402555bf275388291a0aecf7990d6
SHA1270c162b3153d86e650795d5464f64143663604e
SHA25605eb0d78f32ba9c88cb023c83f3fb5e5ab6bd9e476954754b8c006d0a5a5f58c
SHA512e7405fd9a9f749510771df0d6d7289ddc6d9f3e36f668a86e3c53d0f2b038b18dc9efb5c8508a77ffdfd123aad8d34bedc05fe0033555b05def1d90ef571ba81
-
Filesize
11KB
MD53b350f6d8175ca70a877a5e1ad6efb8e
SHA11ec59242896c1e7f293ba1213a6b9f959679992b
SHA256a236d0dbdd02b1f1a922037d4a149fd83844e6d26def6dbbfe257cb296e74536
SHA512e2a5108f5a9c5b72f7289adc1a1170256a7d3a19bd924609a130dd64b2dd59343f433bc3dd9ff41055123df591739d8726d9aeb26e45d136ac700233fbd12394
-
Filesize
13.5MB
MD5660708319a500f1865fa9d2fadfa712d
SHA1b2ae3aef17095ab26410e0f1792a379a4a2966f8
SHA256542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c
SHA51218f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4