Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe
Resource
win10v2004-20240802-en
General
-
Target
c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe
-
Size
28KB
-
MD5
5eba6bf8d1538761cf194e6cf27525b7
-
SHA1
70737cea5d0a8254717809549fbd45aeb717acda
-
SHA256
c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9
-
SHA512
1467d94900c10d9acddae755698b1c02d220334bf5bd8d3e75165456fb9a25e51ba2c95b5a946e24558b9b63d990ecb86691525207f674689263337f047f8160
-
SSDEEP
192:G49HsxwSUFx+UEqzerwdIpJNY8uMp7QPJVNMxUPAUBlrHeYX6ViNobz4ln:GBXUFh1yvN/uMmxDMmTeemEof4
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\gm.dls c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\drivers\afunix.sys c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe -
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\AppxApplicabilityEngine.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\CloudExperienceHostCommon.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\locale.nls c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\oleacc.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\TpmInit.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\wmpps.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\devmgmt.msc c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\dwmapi.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\KBDIT142.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\pcacli.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\PickerHost.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\MbaeApi.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\SyncCenter.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\SysWOW64\mfc110deu.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\SystemPropertiesRemote.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\WINSRPC.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\BingMaps.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\dimsjob.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\FWPUCLNT.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\KBDA3.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\keymgr.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\cryptdll.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\fdeploy.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\KBDINUK2.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\TrustedSignalCredProv.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\cmutil.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\ExtrasXmlParser.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\VscMgrPS.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\fdWSD.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\KBDLV.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\MCRecvSrc.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\msftedit.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\WSManHTTPConfig.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\certcli.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\efswrt.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\imapi2fs.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\KBDAZEL.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\mlang.dat c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\appmgr.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\docprop.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\KBDTIPRD.DLL c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\VAN.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\kbdgeooa.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\msadp32.acm c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\pautoenr.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\TextInputMethodFormatter.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\linkinfo.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\mstask.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\twinui.appcore.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\XblGameSaveProxy.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\sqlwid.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\d3d10_1core.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\ir41_qcoriginal.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\mspatcha.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\muifontsetup.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\perfctrs.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\bcd.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\httpapi.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\NPSM.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\msvcrt20.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\wer.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\WinSATAPI.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\wlanext.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\SysWOW64\cero.rs c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File created C:\WINDOWS\winhlp32.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\write.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\bfsvc.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\HelpPane.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\mib.bin c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\notepad.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\splwow64.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\win.ini c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\DtcInstall.log c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\hh.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\setuperr.log c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\system.ini c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\WindowsUpdate.log c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\explorer.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\PFRO.log c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\Professional.xml c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\setupact.log c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\lsasetup.log c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\sysmon.exe c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File opened for modification C:\WINDOWS\SysmonDrv.sys c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\twain_32.dll c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe File created C:\WINDOWS\WMSysPr9.prx c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 1092 msedge.exe 1092 msedge.exe 3324 identity_helper.exe 3324 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1092 1364 c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe 96 PID 1364 wrote to memory of 1092 1364 c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe 96 PID 1092 wrote to memory of 4516 1092 msedge.exe 97 PID 1092 wrote to memory of 4516 1092 msedge.exe 97 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4408 1092 msedge.exe 98 PID 1092 wrote to memory of 4140 1092 msedge.exe 99 PID 1092 wrote to memory of 4140 1092 msedge.exe 99 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100 PID 1092 wrote to memory of 1476 1092 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe"C:\Users\Admin\AppData\Local\Temp\c2ca971858018214c3e9822bf32c38d611ed1c82b3e8824ef3c60d14881fa4f9.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe06dc46f8,0x7ffe06dc4708,0x7ffe06dc47183⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:23⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2672 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:83⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:13⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:83⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:13⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:13⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:13⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:13⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:13⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:13⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1400011706475479388,13063657441275743202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:13⤵PID:3276
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.antispyware.com/2⤵PID:3288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe06dc46f8,0x7ffe06dc4708,0x7ffe06dc47183⤵PID:4432
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5cc636dd66729060a4960e87152dac837
SHA1157e0dbf66374fc573f6fef2096c1a3fe6e664a0
SHA256ca2bd6fb44784c475fa8746810e6056273733539b31f630462c53efba56725a4
SHA512030142b383d17e30eb06c5d1ec804832a3ca5a16da5cabcb8a1b6a145f08d24fb27cbb776765e6b0aa3e16dd8c4de3de0e2129f3477eb88b28bc587f8ac4b450
-
Filesize
5KB
MD5f54132fce59c4a50232b66a97419cc91
SHA12c4fe2af0dc377ca7100d1e5d7cf666cc3888c8d
SHA256e27eb768b7a1e508d7f390c573e6973f00bf870188b3f453c702de89de1f7eeb
SHA5123a07ff073888c5f43eed6e7b06d78b9783562828806d765f3783b0f78146b0b5d362c8f7bbf59ed7f56c4dc1b1416d27d1a89df557dcf25057b130de37e740f2
-
Filesize
7KB
MD51c72587b64e7ba34c0dd9ab04569bfe9
SHA17b7b68c182810c56f757633aace05e201d09f619
SHA256c2a83c2dd32bb9b2538f12693f53919613a6938805347b81b14a05a7209e407f
SHA512ddd1c74d36da61bb38d3960ded3999f598eb65f6e478691081417db8806d2a3d27ece2e700daaa5178aa7237c1db1069823cad16d8642c123fadec7edbd060ca
-
Filesize
6KB
MD5af43b63b3016ca6cd1b50d126e37dfb4
SHA15ab82d185bbd9b21231cb8dbdfababc8c385ed85
SHA256e641e494891bb3f43acfdf22f9748e7c252dbb9a8108c23f9bb23115f442adab
SHA5126d362bf6a278ed95212de21838977839982ea64257209642077fe64f86455fc3a1c6eda93806a26d3b86eea30819112ef5ac206ccea4aed2f5b18066accecd44
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f108ff5178a63f80e9be8319d92ab814
SHA108f9c60166ddf1fd34651c4cc257939370dc2c89
SHA25648d61750055cdced7d9c235d1d83a486f609da1f74f9dd0b90429d695d49433e
SHA51274b058f866dc00ccbf988729590d1456c21d0d26640ec28ba586483332870ffd34b56be7a4f8374cdaf26524e50f938b5f44522ac11b9d65bc0246f67ec12c58
-
Filesize
29KB
MD570ce7504b86cf75289c6c04b3b7b780e
SHA143bf0ce92251984047fa6847b674227300cb759f
SHA256eaec2b3234f0888f83b089ca6610dcc93b0938b7cf3c7068ebcbb0d3c5a000a6
SHA5129cd91f355c6e0f6b99ae87c28b2d11c443d78a9b5304d6084ecca9298681c59ad358da31a9376b0f4eb479eeff8dede4d1bf262d4750352a173c3b3000190e4b
-
Filesize
405B
MD5fd8a412d3067ee2cf45cf6d1624ef9b8
SHA1105231b1855e450638c612bb3a2322cdf9e9a377
SHA256af08d35cb609bb4b7cd705022ceceb1110203fe4cb63b480093532800ad03d7b
SHA512c26b2b6c2df32b5a41ac1104a250e9f9cd2514950f6a9f7f35e2fde60d0a4818441208e9b842b2f4cc47d40614a333f49f5380b65fe3060fcb7712caa09a36c7