Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
hamstercriminal.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
hamstercriminal.html
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral3
Sample
hamstercriminal.html
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral4
Sample
hamstercriminal.html
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral5
Sample
hamstercriminal.html
Resource
debian9-mipsel-20240611-en
General
-
Target
hamstercriminal.html
-
Size
9KB
-
MD5
27ef3c0d1cda341fb3d762c55a7e7c41
-
SHA1
3c7c7ecc6d94a580970121e1ecae08a756c32749
-
SHA256
e82f51e30dee6819602f309d22ab4cee33f772687d983b85c931a6e3a739d937
-
SHA512
4629de3c1f570682b06711dbfe4c52a9d9eec883b37668ce12b9afa7b29601c9f179f74d5d10823d16d374cdd0780e70977393786cf255a56f786efa72686017
-
SSDEEP
192:ZUl/+Uuv13xV1cSHYuHqvgD5IIhWp6psOsW4rzUGrVEGg5CJk:ZK/+7v13T1FHeo9IIm6Q4sxgYJk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 43 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-656926755-4116854191-210765258-1000\{F1BA65D1-A67F-4CF1-87FD-8BB7411C45B2} msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4444 msedge.exe 4444 msedge.exe 2392 identity_helper.exe 2392 identity_helper.exe 2952 msedge.exe 2952 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 392 msedge.exe 392 msedge.exe 2596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3316 4444 msedge.exe 82 PID 4444 wrote to memory of 3316 4444 msedge.exe 82 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4820 4444 msedge.exe 83 PID 4444 wrote to memory of 4648 4444 msedge.exe 84 PID 4444 wrote to memory of 4648 4444 msedge.exe 84 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85 PID 4444 wrote to memory of 4644 4444 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\hamstercriminal.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab67246f8,0x7ffab6724708,0x7ffab67247182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=2132 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6232 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3284 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3008 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1602958079774510240,14343493360405781291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:2540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
16KB
MD587e1d1a5abac5ec0bdb4cd5278faa55a
SHA15235aff0eb56f9e3237b703ef505b39a8e99e727
SHA256dde3686db4f76101069b04248550eafbf3310af048ea52f4449e0f7b90d6b818
SHA512adb91401634b124a9ff5f00537a07426380800a49c774547322bfb76729ec431e0bb744583d37a2e5850d6c6c00ab9fa3bb18b713ea6f434af481849b52a58d2
-
Filesize
542B
MD5ef26d6e64dd4079dbcf027bea68a42af
SHA1c02a3d8e7abf7c499a4e7b68607b6fa8e2a689fe
SHA256032b66ff3ee7850fde3cb51a45b608b54e0a296e0d43f70275e51adfe4d571d0
SHA512cd7c35a2987e5de0e6daf4ac47182ccaad37ea517ee9fcae421b327af16e36e546fa9610f1e86a4d06f0d55529ed7d518d973ca6d7a70665b0370320b37bb250
-
Filesize
542B
MD53e63267370328274f800e3eb4bc4e7f7
SHA16019f608313813c9818533fb852384209cc9ce2a
SHA2568fafd505e37849b86cf6551a280b62c72a21a354ff8a8704125a493c5ce0c19d
SHA512f5bc97fa6f92df20d7161b3fc635a3510b98620a58ec3af0f4e5a0e9bbe52b5a8193344955d83a9d75d02790927b439f6edca3cac0a69d454b034b518e831a75
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD57bd90faa2291d1b8fb4e3ecff8397392
SHA1f32b9b62277f7449517a9306f8f455b9472606e4
SHA2569d9f0f3fb6c7031441ae37e0ef9df6e77eb1c7fef255e5b1e371950d43f21d18
SHA5122682ce23a5669f9b784b2bf8558497b4b8ca07bea3308dd2d54e6a976a7cee135c49a7ffb1eaec18637f0afb4d28e6cb1dc4b07ab96fa9ab089c973e75497c19
-
Filesize
5KB
MD5a468541dc5896eaa5faacb9f5f87510d
SHA1edd340bd2c41126b78e4e322dd247efa6878c56c
SHA256a121c6d8fd4ceda375c2b670fa8cf1d9031903880957ab6f896c9da3066a787e
SHA5129e2e46097aae3678b72212966f8289773ec6cec859d7f713fbefd5980cb2ad1e43a2b2bf2a331cb486fc3e6127fbebee285e4838ffabe02c90f0e92d77aa73db
-
Filesize
6KB
MD5d141d2abc7bb7e72a53744004d3231f0
SHA1be80abf8e25f429e9da85f8aa8e8d8dd4b4807b3
SHA25690158363493f995ecfc8261ac3f4105248e6ca1c3775cb4756bc36d0b396fd9b
SHA51246457639f4d07ab4ba7377ab22ae128e95c3fb0678a2474a6da30ec5c6f7822926946d2e008565cebc74d353946df1611a68ffea771e03fbe86ba31171feea23
-
Filesize
6KB
MD59d94141711ee941b30b3e3e8c3614a82
SHA12d443d32b292828b11ddd62fc7ef90b38f5832ed
SHA256fe64a6193de57d078847f6a8bdadd3bb9c4adfadd5eba007e7ed2d7a49317611
SHA512548bff59ff2d587471c23b8f4a8a49e144dbd3cb67bcb729cb810802526d70dcc03385057b4faa4946791b01828b9e3f48cb0013c3332ae6d7a952bbca37bf1a
-
Filesize
8KB
MD5da77674c4a9e61c47eb3fcf25b277075
SHA185f1d3dabb0b87a1a68460dbc1286f2ddedc856c
SHA2568d504e93e152e1375bbeb61683ee6538ea1092b8a3b3bb02042a0db6c6bb8638
SHA512e18b5c87c25e73c8e098b8d45b8e4eca66e6efee245ed94c6f08b2a8f0fe7f905e8894954c8ac8d4acf55391fe6d407c8dbe907608348448a992f8df787a6f6b
-
Filesize
6KB
MD5254e3786eb314a2b344eb7337838b52f
SHA138b6798c48bd7ab1c49e68df5289bf756df75ac2
SHA25620b1699d1d4aaf98a55389cc06aa1eabec07ab4b5b359cfc30e92275c6d742b7
SHA512446f6444028359f86254e5bfc57ccf4301e00d03d98cbb2b52987a71a7df139356faec9bc729f247ecf617bc0b1f287acf64171940f6fe476d2d8a7e759f3fde
-
Filesize
204B
MD5aa64d068b5b25fca64f0eb6210a7120d
SHA1a527bd017e8472b07ce8fed1e4c8b597b990183c
SHA256b9839c9f614f9040528debf4c77c4b2d4304a40c3c19c0860b5d97c7edaac281
SHA512969e15d661f644ed5664044b5eb884e568077b2161108ae51471b3771202d01acf11344f3136f562b31999d438a11271eace384b6fa8418fcac57db7a9822376
-
Filesize
1KB
MD592dc83ca979fcecb16447c0d299cd278
SHA14922609be1c314c3d7927db6040c16720ef12899
SHA256e54b4b0a045042cef3e164fcf1609c63e80042ce2f78c9f77fb9dde320cdb696
SHA512633c13a0943ce56b236c36ec6e86784abd2ea7fda33a6f75a170d3e2c2fd156f5724b3b31fae4f47cadd80f3fc321f35c2d654bd45bd87eb40e24b767edebf50
-
Filesize
204B
MD50fe4a4408cb27d0ef3bea97e46b9523f
SHA19c22ab56998e09201255d2bccbe7b0ccc99c2768
SHA2566dc146d56317ca416ef1c288ff63e6f4ad74638f80717bc56fb2a54790be5ff6
SHA5128a732b133cd17ab16bb43f8402e793978bf84815ef0071abc2a7664c42fb3c72131e6273eaa5d08fd35a7729054e0c9129ab8212e1fe554335c5a4b1a6faada2
-
Filesize
204B
MD5dca84963cbfc876db87bf8c345f744cc
SHA1ab73a4db503996885ed4cddfeb3cfdd6bbd51e53
SHA2564b1ce8456dcb5b1f98919dd79c1ecd73a954bcb2d934bdb8e320cccb721ad6a1
SHA512df311530189f5ae899d83d45523aa1a324f421f8496492aaf76743b5948bf3a0daef70e237c8c995e88d19c3117f81f72ef24ac1bc049f9ca5551f33e7f5c5ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d99c3ddd594f97c924385a002f191db3
SHA1717b0e48065f45207dce3bfddbfcefdbbccba6ef
SHA2567825316cc3a2273021c8722aedc7a9081e67da4fdc899cd1ba090cc616cd897c
SHA51257a0412fc8ac14cb54d5a6efc870e37828c0bd245258a0e2b190db8b9e7908130ab50fd925b0f43ee4b82c4eef5840f0962026b08690ea5718ab692ac76dfe97