Analysis
-
max time kernel
90s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 13:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&
Resource
win11-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2460 loader_prod.exe 1204 loader_prod.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings msedge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\CBD7F57F393FBB84208A2D822D1600A1EC4C3FB2\Blob = 02000000000000006c0000001c000000000000000100000020000000000000000000000002000000330039006400360062006400660030002d0033003800370063002d0034006500380038002d0062003200390033002d003800370038003400310034003900390061006300630036000000000000000000230000000000000014000000cbd7f57f393fbb84208a2d822d1600a1ec4c3fb2 loader_prod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys loader_prod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\0249ED741DC60DFCD63BB6D5F8B1B35B40E3E22E loader_prod.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\0249ED741DC60DFCD63BB6D5F8B1B35B40E3E22E\Blob = 02000000000000006c0000001c000000000000000100000020000000000000000000000002000000370037003800310030006600610063002d0066003500640034002d0034003700640031002d0061003500630038002d0037006200350035006200650065006100630062006300660000000000000000002300000000000000140000000249ed741dc60dfcd63bb6d5f8b1b35b40e3e22e loader_prod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys loader_prod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Keys\CBD7F57F393FBB84208A2D822D1600A1EC4C3FB2 loader_prod.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 89954.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 5068 msedge.exe 5068 msedge.exe 2876 identity_helper.exe 2876 identity_helper.exe 3144 msedge.exe 3144 msedge.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe 2460 loader_prod.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2460 loader_prod.exe 2460 loader_prod.exe 1204 loader_prod.exe 1204 loader_prod.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3348 5068 msedge.exe 86 PID 5068 wrote to memory of 3348 5068 msedge.exe 86 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 1464 5068 msedge.exe 87 PID 5068 wrote to memory of 2320 5068 msedge.exe 88 PID 5068 wrote to memory of 2320 5068 msedge.exe 88 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89 PID 5068 wrote to memory of 4936 5068 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1280825422749241375/1280887539820924928/loader_prod.exe?ex=66d9b6fb&is=66d8657b&hm=0b430d56a25be2de3d2cdc834d0814c79632d0e4eda489b962156290886ab014&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2b9046f8,0x7ffb2b904708,0x7ffb2b9047182⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2228,7398251343921789854,4176727435657602421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Users\Admin\Downloads\loader_prod.exe"C:\Users\Admin\Downloads\loader_prod.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3636
-
C:\Users\Admin\Downloads\loader_prod.exe"C:\Users\Admin\Downloads\loader_prod.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5a6c036a1c2375efac54066f3e8ef3265
SHA12864e736aafd339d0e8664ad16c928db54cae974
SHA25694623f72f55bc0bb0e3917f3f3554917ee627ba07b90659b93e52a59103a9aef
SHA512ce823966bf20b4498784bfff06ea398de8751b9060d6cad7a9bc9caed5603f93adec1c8b845c463907fe80a9d9a682c47122ec447cd2951b01269447d0dfc01c
-
Filesize
6KB
MD58e51ae225ccf0d0b63fb843b3921b5ff
SHA11700166b721c7dff471b84c65d8949f99de6da28
SHA25602abf1ac757e3d65e340cdfd67026a3b9f775669bbf0c753a5254b5efcdd8cd1
SHA512cb85d2bc8f28893ee27927246fc60564cd01a9bc138b704b8ba2e1f8b49ac26e160ebdaa397a5093e22a46d7255183eb7f324251dced97ff1b2c6956bab4934a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5880c85a3797f9fc17cb37354862bd4cb
SHA1d12e8de9675812e2eb0cc36167b9344c836b4aaa
SHA256d0a91c608275f93fb8a887c5af8c29ea5f0bc81fcf37ee2cffab1539ad123644
SHA512d79fbc1f038446081eb059bcea544e1b720ae0700a1bf2c006400b3eec19d89e1a71b5b1184120de98eb3a457feb5710cceb676514955f79bf134294ded3829a
-
Filesize
10KB
MD5f49bdfa663bbfae1e232f1fe8f046b02
SHA146c62b5cf2659acdaf0d85c209afc461d5bb5461
SHA2567ed59bd6a14ee5e0bc62387c0e0e3321f59f940b05355376fc14e46eb8d3484b
SHA512805ebb582003f56ae280de403606ebb673b8350d36b2a0bff1337f0821ff9f2893d77eb2321c0652adb5c71ca59686f0518bdb9d38cf0c48405e722c74da5aa0
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\2BEC128BFC1DC46ECF9336A52D5B1EDB1265FA95
Filesize984B
MD59f2baf0cba9a3b0021d781fdb2ab6ea5
SHA142183b94f4946f261fca11d183a96dcd90b90b67
SHA256e9a5f769a1f3e173a4849dc8d2a5ce89ded9b5ece6c07f42b1b0e8b55d1d2193
SHA512937a480963026552e67f2a8ac489cce6df22e4467508c20764266faaa93710ad105df4254b1b3e95f81e5b270accb9b462a0b1787223c228337e7586050cfaa7
-
Filesize
26.4MB
MD5ba41431c69cb3a3a558b7d363ad5160c
SHA1c981e506dd06d254c456b64fb01de3e5a73ee178
SHA256ade6b6e09ec807df13e6128b48461ff279967f72bd12cfc777d7114e44b1219c
SHA51241fccbaa530cfa63ecb1423b79d83fba9f2dbac7f0dd01cbb6653b7e027d1c549830f1d37a923684cfc7ba37644761ad59d11f077250ac0758694252449f4f8e