Overview
overview
6Static
static
6APKComboInstaller.url
windows7-x64
6APKComboInstaller.url
windows10-2004-x64
3com.procam.camera.apk
android-9-x86
1com.procam.camera.apk
android-10-x64
1com.procam.camera.apk
android-11-x64
1config.ar.jar
windows7-x64
1config.ar.jar
windows10-2004-x64
1config.arm64_v8a.jar
windows7-x64
1config.arm64_v8a.jar
windows10-2004-x64
1config.arm...7a.jar
windows7-x64
1config.arm...7a.jar
windows10-2004-x64
1config.de.jar
windows7-x64
1config.de.jar
windows10-2004-x64
1config.en.jar
windows7-x64
1config.en.jar
windows10-2004-x64
config.es.jar
windows7-x64
1config.es.jar
windows10-2004-x64
1config.fi.jar
windows7-x64
1config.fi.jar
windows10-2004-x64
1config.fr.jar
windows7-x64
1config.fr.jar
windows10-2004-x64
1config.hdpi.jar
windows7-x64
1config.hdpi.jar
windows10-2004-x64
1config.hi.jar
windows7-x64
1config.hi.jar
windows10-2004-x64
1config.in.jar
windows7-x64
1config.in.jar
windows10-2004-x64
1config.it.jar
windows7-x64
1config.it.jar
windows10-2004-x64
1config.ja.jar
windows7-x64
1config.ja.jar
windows10-2004-x64
1config.ldpi.jar
windows7-x64
1Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
APKComboInstaller.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
APKComboInstaller.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
com.procam.camera.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
com.procam.camera.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
com.procam.camera.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
config.ar.jar
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
config.ar.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
config.arm64_v8a.jar
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
config.arm64_v8a.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
config.armeabi_v7a.jar
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
config.armeabi_v7a.jar
Resource
win10v2004-20240910-en
Behavioral task
behavioral12
Sample
config.de.jar
Resource
win7-20240729-en
Behavioral task
behavioral13
Sample
config.de.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
config.en.jar
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
config.en.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
config.es.jar
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
config.es.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
config.fi.jar
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
config.fi.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
config.fr.jar
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
config.fr.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
config.hdpi.jar
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
config.hdpi.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
config.hi.jar
Resource
win7-20240708-en
Behavioral task
behavioral25
Sample
config.hi.jar
Resource
win10v2004-20240910-en
Behavioral task
behavioral26
Sample
config.in.jar
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
config.in.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
config.it.jar
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
config.it.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
config.ja.jar
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
config.ja.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
config.ldpi.jar
Resource
win7-20240903-en
General
-
Target
APKComboInstaller.url
-
Size
59B
-
MD5
b57de9520684486ca7b3de5d55487995
-
SHA1
9ceb08a63c985fb52072d2001155be791b69cdf5
-
SHA256
cbd9b3cd696fa59c37d79d08bea05a24258a3df7e1ac913872cf131e2e14c994
-
SHA512
ba40299d995a3bb14560bd31b6689c6db97fd568ff5153ab2aca55df691cce9d1e42ccb22ab36e29ab82077243fae6e31e5448c57ddf553eaab9632db35cd5f4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 4708 msedge.exe 4708 msedge.exe 2352 identity_helper.exe 2352 identity_helper.exe 5544 msedge.exe 5544 msedge.exe 5544 msedge.exe 5544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4708 3524 rundll32.exe 83 PID 3524 wrote to memory of 4708 3524 rundll32.exe 83 PID 4708 wrote to memory of 2776 4708 msedge.exe 85 PID 4708 wrote to memory of 2776 4708 msedge.exe 85 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3452 4708 msedge.exe 87 PID 4708 wrote to memory of 3668 4708 msedge.exe 88 PID 4708 wrote to memory of 3668 4708 msedge.exe 88 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89 PID 4708 wrote to memory of 4772 4708 msedge.exe 89
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\APKComboInstaller.url1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apkcombo.com/how-to-install/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xec,0x108,0x7ff8f8b946f8,0x7ff8f8b94708,0x7ff8f8b947183⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:83⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:13⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:83⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:13⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:13⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:13⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:13⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:13⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:13⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:13⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:13⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:13⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:13⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:13⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6744 /prefetch:13⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6888 /prefetch:13⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7188 /prefetch:13⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7400 /prefetch:13⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:13⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7780 /prefetch:13⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7940 /prefetch:13⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7348 /prefetch:13⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8232 /prefetch:13⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7724 /prefetch:13⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8436 /prefetch:13⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9384 /prefetch:13⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7888 /prefetch:13⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7896 /prefetch:13⤵PID:6236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,405838842872790987,7100579953862104135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7940 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5544
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5cde3baac8cb99a5fb5d650ad3cae92cc
SHA1fe2685816356f6ad8982ec639a51ced550ef5091
SHA256df78f98d1a98baab1741b0039a5bc4ebdf40641ab1d785bbc7603113f8e7bbe0
SHA51248442a1f76168708ebfb0de994ad045e7f8f19ce0ccfdc68b2657e6c384b755239e3df372c761977f1c7493fb1320dc790f601c3ebd7e50c11d2d283e17df19f
-
Filesize
5KB
MD502c383de30d491d061e7c2d8d646d251
SHA15769744920eb96531bc2eb06a29a217d1c18c6fd
SHA2561f248faa05575843cdb9d27faaa2d459e12e8e5b5817303f1505c3bd1345d866
SHA5128051ec966f0e56f174d91dd9656ed6573a2cf300485f4d2d4fd1dfbb067d9c6b7c7f7817d1cb36e5b4b64873ee7d1e3745c19f6c188ac8d17183e6d5d16dba28
-
Filesize
5KB
MD539f4cea97dd5c1987eef8a629037e1fd
SHA16fc8d6d02b7d4c4e890168453be5be21352b071a
SHA256bd5e0fbe851aa8c7c2b3db9357d9546b0b47f2b1e52d807e387ccf8b71bbd253
SHA512c3bcbcc890f39650e242f38e92bd56b8444a07d76d5e5b32910ab7aa03262ba1512400e57e10bb5603c84bd2e36fc80f1e17f3d6de1fc0e282a7addeeb61f35e
-
Filesize
9KB
MD52b58ba7afe40f7a6147efebe4f570f22
SHA1852dd6f43753dc91df8d62d69875606a814aa4a5
SHA25689a326536c4f7ae9e77413c36a74ee4eed067034e488b8055ab92172de8fe02b
SHA512a6de8b545a48f58c12fe2fb97e4e23df27f63259f994dbb61d64104c4f15dcc8baa02115ded370ffd0e64cdef8bd2565a6ed0c44a78041b6f9f76898e1f61ea7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d8c8fa2ba94112092ea53891ef5b0279
SHA192a1049599a43999c544695c84a1a3f65e27a8ef
SHA256ec47e61ab91293bf6534875d123e9f890aba1d7aee7b610f51078ecf3756d058
SHA512a4bca51396e8338b684e73ddad8aed50f11adc4b12eff181a281d1af1988ecd870c990333cfc04bb842c09fa548fba62e5c5ffc25d0d58b81b0e031c4b655e4b