Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 18:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://objects.githubusercontent.com/github-production-release-asset-2e65be/845736791/6b69b958-219c-4543-b495-a60155859963?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240904%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240904T184316Z&X-Amz-Expires=300&X-Amz-Signature=d200716289966b481650ec41aef0a3cd3af1154b59a8d5eb02fb875b017522cc&X-Amz-SignedHeaders=host&actor_id=146635930&key_id=0&repo_id=845736791&response-content-disposition=attachment%3B%20filename%3DFiveM.Lua.Executor.rar&response-content-type=application%2Foctet-stream
Resource
win10v2004-20240802-en
General
-
Target
https://objects.githubusercontent.com/github-production-release-asset-2e65be/845736791/6b69b958-219c-4543-b495-a60155859963?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240904%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240904T184316Z&X-Amz-Expires=300&X-Amz-Signature=d200716289966b481650ec41aef0a3cd3af1154b59a8d5eb02fb875b017522cc&X-Amz-SignedHeaders=host&actor_id=146635930&key_id=0&repo_id=845736791&response-content-disposition=attachment%3B%20filename%3DFiveM.Lua.Executor.rar&response-content-type=application%2Foctet-stream
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 884 winrar-x64-701.exe 1656 winrar-x64-701.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{1DDBB3C7-6662-454B-8A22-DC3B83BBCD8F} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 887391.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 2936 msedge.exe 2936 msedge.exe 1520 identity_helper.exe 1520 identity_helper.exe 2232 msedge.exe 2232 msedge.exe 5856 msedge.exe 5856 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 884 winrar-x64-701.exe 884 winrar-x64-701.exe 884 winrar-x64-701.exe 1656 winrar-x64-701.exe 1656 winrar-x64-701.exe 1656 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3104 2936 msedge.exe 83 PID 2936 wrote to memory of 3104 2936 msedge.exe 83 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4608 2936 msedge.exe 84 PID 2936 wrote to memory of 4828 2936 msedge.exe 85 PID 2936 wrote to memory of 4828 2936 msedge.exe 85 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86 PID 2936 wrote to memory of 4596 2936 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://objects.githubusercontent.com/github-production-release-asset-2e65be/845736791/6b69b958-219c-4543-b495-a60155859963?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240904%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240904T184316Z&X-Amz-Expires=300&X-Amz-Signature=d200716289966b481650ec41aef0a3cd3af1154b59a8d5eb02fb875b017522cc&X-Amz-SignedHeaders=host&actor_id=146635930&key_id=0&repo_id=845736791&response-content-disposition=attachment%3B%20filename%3DFiveM.Lua.Executor.rar&response-content-type=application%2Foctet-stream1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3340 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:12⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6964 /prefetch:12⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3440 /prefetch:82⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,11518912510542239613,7310234678444276089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\fea52c8c03834fdcb407d497177f6a7e /t 2356 /p 8841⤵PID:6120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5af06b5b8cb6c349bad1333af5ffa5e20
SHA18cc81b6f0351e4a789ce9f192a8335b3eaf96198
SHA256245b8c80a9441d4af5456e35d76df2637efce2324abfb91bde4c89a103fbdde9
SHA512c415d089aaea793ab2b5c2fa1690de69b40702d78d0d805df2f7f47b498aba1cde06ecb21de805001773542578410d6c62995e782dceb9410e788067db65b595
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD554a27f0e5cb17ec9889f1b0173436b37
SHA100d0fa0e9936cc36e240f8e81b2e19caa62134cf
SHA256c3e3dd301cbf4e2d54028226721deb6b0143d7e10cbd41cd82ec41397dc8c880
SHA51277cfab7a8c678c39d84d3f0139d08b457168e883e48826308a7ac8e93aeac76bcca0660a3206f9f7dafba397ade85e092f8865313e7690b1bc88878ff1dd7b4c
-
Filesize
570B
MD5b736577eba6f82c0cfe664014682c753
SHA1e7460c56c908cc9090b240913b0df262275037f2
SHA256ea080e107b66f0b92167df9d5523c0b3a375f5d99601b614d0fba626d6e8ca8b
SHA5123792ba38902bb46c00061e455865975ac1eca3a5a051ac3a8cf004350aaea55d369857ded8e01f5d036858dfece6b7c89a36cdcff54ed34a9a8e32a785134a56
-
Filesize
5KB
MD5f2125f3d899305eb1a55ce41cbee89a3
SHA10c5741184353f0e1df7602f4964ca4157df00055
SHA2569cc6d4da4a759f70b6e8e91c6cddcb474ee5af987f97f80beefc626ea471e844
SHA5128980aa8db501788b61a7846e0f9d6bb9271bce8f5d1bcdf5fa95fe95dba9bc25b5678a87d70f648910e4c18d86308ad09a9b376c08ae7e975f62a9cad53662dd
-
Filesize
6KB
MD5d29403cb5e5eb718d91efc5ed9571d5c
SHA189033dbd1be008a4cd4d1d9437134b155cb5bdce
SHA2567ea9ad6d11bf1db1b2f1cba1e3f66c1ae468c4213ba306e87e5faa6d18905abe
SHA512c0cf389da6db4fb3a29aa81a7adac996b960e7efecf734631c4ea07f06681cacb831281585b73a0015672130d6b24852e815262b284a31f25131c38f86c425be
-
Filesize
6KB
MD5d3477d76c4ecb378de3f5e33fd04101b
SHA15faaed775b7ac903626df50ab44bf0cddd0d1a0c
SHA25637f5d4f303741bd0e8d24614402cc486055e6fd4432573ac6f33f7e34fa5e98a
SHA51298339ab9983998f8f067cbf5660581ab417eaf6bd79a1c58d06f02f08d4614d0a9be4a1585fda8a59e3ee251a05099f583ebf03e41bb76167007b034c02e9687
-
Filesize
705B
MD5eaaba9ebd78098346eb11bea7571aa85
SHA100fda7ad06016ceb8c28a45917115ccbaa198eea
SHA25634cdddef7e9fb020e9557c87a7a5a511d2328e4b65ac94da74d53f85b57b4117
SHA512c644f796214ce631d5b67655f241bee6ccd083862b9327ee6f3b33182065d8292757ff8db5735a7a7ffd709b0803d042149906284e4326fc7d805da78705c9cd
-
Filesize
705B
MD5cbd05854f75a0bebacfee063698f276e
SHA1fd8b644159001275900b9fe39e303c6102f66b7c
SHA256d0d03ba059a0a2eacbd9a1de01433fffb3a1fd65364f1f21bb5eb4223f99fd1f
SHA51277eb9d1db93c941c26ed89b3825d175be2f7d6d04f5ddbcd73dcff1c1d197325fbda8860f38adcf50639c6ed1d72d892c954734b8ca79ab42d5f9f1635ff9843
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a3be5a1c-60d3-46f0-a007-eb7383e2815a.tmp
Filesize6KB
MD51f40d1e1f8ed8f66f9144900c5943d8f
SHA181e5a9ce9f2e73586caaf0223a673ba64953fa52
SHA2561d18e8f278b139d8372f3e033350f89a0bcdceab96076e55bb646ca0465a8114
SHA512e058a79a1e4152af7768ed4761693b4de87d7a51c8c0232056aad124c9ad28e2a1da9af264a287a635932068c863c062716c60a0872867a608107123c3018a9f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54a4dd0828202f38ad084840e3759f8e1
SHA1b1c81901fb0d0fa0b8ca57c0da82fe8a9f9e03f7
SHA2562da78c5a6d2df8729f866a7dd6711d3901d47118f5303d145ef5343da8ff65c0
SHA51251a3c083cfa15a702d064621ad55d2ea78197f57136650b74886cfb7cb0cfcbce18699700e516729a475b1d8f573038c3361c5acb8cbec40262366258ab5f823
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6