Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe
Resource
win7-20240903-en
General
-
Target
47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe
-
Size
1.1MB
-
MD5
72999cabd86e86d2febda33b02da8b93
-
SHA1
c0c149533d5b3b3faf1509e1edfd83e91e13eda8
-
SHA256
47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a
-
SHA512
bdd2a83a5ff647fd4413cfc0b45104c444de179e0ea87c4eda3e128939af686a06a463974b70756da0624ab2e5a007c7d40060a00f2a87c474c5af8bb1bd7312
-
SSDEEP
24576:NTbBv5rU/2K96TlJTWPyHpt4lT3lgWHn1+rfQifbAZP+vPo:HBdVTl+yHUr5sr4CAZPOPo
Malware Config
Extracted
remcos
RawnyHost
94.156.67.144:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TKWPCH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3624 uusijwtl.msc -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3624 set thread context of 2676 3624 uusijwtl.msc 92 PID 2676 set thread context of 2600 2676 RegSvcs.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uusijwtl.msc -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1132 ipconfig.exe 5076 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings 47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3624 uusijwtl.msc 3784 msedge.exe 3784 msedge.exe 3616 msedge.exe 3616 msedge.exe 4468 identity_helper.exe 4468 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2676 RegSvcs.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2964 2324 47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe 82 PID 2324 wrote to memory of 2964 2324 47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe 82 PID 2324 wrote to memory of 2964 2324 47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe 82 PID 2964 wrote to memory of 2220 2964 WScript.exe 83 PID 2964 wrote to memory of 2220 2964 WScript.exe 83 PID 2964 wrote to memory of 2220 2964 WScript.exe 83 PID 2964 wrote to memory of 2164 2964 WScript.exe 85 PID 2964 wrote to memory of 2164 2964 WScript.exe 85 PID 2964 wrote to memory of 2164 2964 WScript.exe 85 PID 2220 wrote to memory of 1132 2220 cmd.exe 87 PID 2220 wrote to memory of 1132 2220 cmd.exe 87 PID 2220 wrote to memory of 1132 2220 cmd.exe 87 PID 2164 wrote to memory of 3624 2164 cmd.exe 88 PID 2164 wrote to memory of 3624 2164 cmd.exe 88 PID 2164 wrote to memory of 3624 2164 cmd.exe 88 PID 2964 wrote to memory of 2504 2964 WScript.exe 89 PID 2964 wrote to memory of 2504 2964 WScript.exe 89 PID 2964 wrote to memory of 2504 2964 WScript.exe 89 PID 2504 wrote to memory of 5076 2504 cmd.exe 91 PID 2504 wrote to memory of 5076 2504 cmd.exe 91 PID 2504 wrote to memory of 5076 2504 cmd.exe 91 PID 3624 wrote to memory of 2676 3624 uusijwtl.msc 92 PID 3624 wrote to memory of 2676 3624 uusijwtl.msc 92 PID 3624 wrote to memory of 2676 3624 uusijwtl.msc 92 PID 3624 wrote to memory of 2676 3624 uusijwtl.msc 92 PID 3624 wrote to memory of 2676 3624 uusijwtl.msc 92 PID 2676 wrote to memory of 2600 2676 RegSvcs.exe 93 PID 2676 wrote to memory of 2600 2676 RegSvcs.exe 93 PID 2676 wrote to memory of 2600 2676 RegSvcs.exe 93 PID 2676 wrote to memory of 2600 2676 RegSvcs.exe 93 PID 2600 wrote to memory of 3616 2600 iexplore.exe 99 PID 2600 wrote to memory of 3616 2600 iexplore.exe 99 PID 3616 wrote to memory of 1884 3616 msedge.exe 100 PID 3616 wrote to memory of 1884 3616 msedge.exe 100 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101 PID 3616 wrote to memory of 4044 3616 msedge.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe"C:\Users\Admin\AppData\Local\Temp\47d3894d6f36f1e6d18089b7b2476a070ab5809cdcd58886e1096750fe928d5a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\qebf.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c uusijwtl.msc qjfcecds.msc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\uusijwtl.mscuusijwtl.msc qjfcecds.msc4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.07⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0xd8,0x104,0xfc,0x108,0x7ff901c346f8,0x7ff901c34708,0x7ff901c347188⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:28⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:88⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:18⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:18⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:18⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:88⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:88⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:18⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:18⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:18⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:18⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:18⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:18⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7682913394883956558,1268802447419081992,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 /prefetch:28⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.07⤵PID:2504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff901c346f8,0x7ff901c34708,0x7ff901c347188⤵PID:4684
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5076
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD517844a0fe330c5292e897d8e4de92fab
SHA138b4d2aecf858a5d986356e48691e4569e15e69d
SHA2562b191977e489e189a24a11db5007ad19885fed9307a7ecf40e7b6b28833023b5
SHA512fbc24c46c43e9aa1f76fb7aab631983d30bbdff2aee04c074d12cafb3727973cd5897bace928ed0c3631d466ee71c45b415705661909d8b8dd6f58bb199e00cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD56f2a32906f1ecc7aaefa4e6cc89b7ca1
SHA1905ce5b1de60903a92b2c7e71f325177ef770d37
SHA256fdd0627e440de382bf4448361a51640f0ea60305f64faae854452e5e4fecc6cc
SHA512cb15a65d4b87de2e8c8288448a60cc8752a58abc81c12698a7e330f7a151e990d1f446843f69f5749dca1fd5498511f656e807efae7e6eb69e65d748d52a3a0e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
5KB
MD5e6f4765ba6036c4257660abc9916821f
SHA17ece5522adbcbb71ce7f848e2192c072700ad893
SHA2563595fc325b92056459b19009bf171a610bdbc543b697118ae5af97fdb25d717e
SHA512398622c7f61fb07a9b92dee760c74c37e1ca3d26c407b8f56b6e7b6cbc8fee6c503e5a6c0d186c96bbca5b467c78938a814b00fd1e0016d88921201c60820e0f
-
Filesize
6KB
MD51f45916c87995cf2d20085d5d614211e
SHA1877a7b0105f2b107200fdb0555118da1b28a7a96
SHA2568d33b0fb3af2b77e44f224d454054f3995dd73cdd7bba2e3cabc01ade5e95c40
SHA512a6236edc27c4d7a60a04fb0f3a8abad94f73de7934cf99a0fb411811d166bb2d1728a25e34f0d53f22add94973a1997ceb9639239f10c0289c508c2cb48044e3
-
Filesize
6KB
MD5bfbb2c7e3075ee55a2ab6aa367923f79
SHA1e41f97b38af15e94a0eb09c7750c676ab1d6d038
SHA256cbefd9c40166be312ad6f08b22024174fb7a31b71ad662203c3a7925bb81ff62
SHA51232f6fce0ef5ccd8c5eb60e45eeeb65016150bc7a6022459141407a7916f59f0e8cdc6d66725a6151d71a19f28fe79712d805718667594585e57f3c7d18e67ef0
-
Filesize
371B
MD5b3a5c7de8645b5fc1fda26176ff68048
SHA10202a0318376b534f86decb28562a2e109cb2f0b
SHA256ce6e2e8741b425750f6c2dd43e2c3088a294a5b7d362c29d05120df7836969ad
SHA51221f42f44b190dba188bac51bec5554220287e300737cc25581309cc663506462243f1234dbaa4fbdf28b56553241e0df4c8b8c405304bfcedcfd6cf69bff6b70
-
Filesize
371B
MD583b026e4f80ac7a14509398a452a6a2d
SHA127a25811654ce8e42369f29c45c8bb186e0d2a27
SHA256f4860b850486c4033564dc632ff453b612c4b0c47864343904247929e90fe2c0
SHA51205cdd5aa7b6205bf9c5fea660ff679eadcf9c1e23bb0f35a659604ea99835e82e078ea5a86750f8c896632a163244a0cde40ed0f3737decf3841241ab121c0b5
-
Filesize
371B
MD5e4d99d539417215bb8a15a95fa87b6b5
SHA11babfc719e31b3965d8cc1202a065bf7997cc008
SHA2563ed4d932201d4e5d708b01f9a918cff7b7b8ca2e84ea752efc592ca82b341896
SHA512d9bbc8be2c8b6e2bea773e3fce95098041490af78fdeb3a97c12e25f15caec80de75f1b1186eac003426ca4149b2df499f1c7a395b211ca5f2ae444fec41f03f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ef46acb770db97d381417dd25c5811ee
SHA1c0e2af2b6a4cd044f5579b34e5c41b94a9ff4b83
SHA2568a6b0d8e6447718579616c24a7ea59179721be03718de24f88846968da99d23d
SHA512916a9470950c6ae81109e05866f879a2b726f00dd6fb0ccf72fc85c5cec14ab017592a58ccb70f5eae3575181d8f0fd5efa548d721a3c4ec0b3ced80a610c849
-
Filesize
883KB
MD581561ccdf1072a4aeac245be6dc6d896
SHA15aa3c79d9bf9014d6a257bddfe48dc3b713c73e3
SHA2565e84b1ee03660d40d4f663ea9fa768141001762b771675cba349e408943c9c54
SHA51249a9c54222aae94200ae65ab2161c44417868b1a5d5e133dcc2207c81058735c0e13ebfa43ac0320f6037e01a9478091108b46885ff20f04aba0cc9abc894005
-
Filesize
30KB
MD56ce29dd877b70fe644f51be9fb626368
SHA1cf6d88789e57e719a5670fa24745c35d35907e41
SHA256b94dfbba1203d7990eece564cbc767f40d7b765149af973541c12e52210a6ccf
SHA512e0e8cdd4e487df527e902a8a117d5e580844ae8b525e357ff2a86d7cf08ef5b722e447d31f85bf40f1ec781849d22ea1c2ca1a24cb26a5c0b2cdf86dfad6f957
-
Filesize
79KB
MD531899ec82b0a8219ecb05fd341737cb5
SHA1e747f7b329fd597a719e969244890143b74d8794
SHA2562d00548d939be2c078642fa9aa281ff9e0ba9fc9f3a78fa257282facd0b3d08c
SHA51280c43cc6b95cf0f344704e93a947c28076d69acd00b7c22390f2cf1140ee3d178282b2869a2a4a59e2907b9247c620ce41be4fefe2e314805085823668931a97
-
Filesize
925KB
MD5eeaa0f5d82e56659c80fa84d588bf870
SHA1a1aea1de9c42e1ef8c186ef6246dd318040e66de
SHA2563fce07bd7e220e97a1b141da155444f95aba7b5e4325f6a5edb262c025c1e5a9
SHA51220b4d8d117419a511cde61ec37c488fcf86d8d6e9174da2496cd71843e8c7f0dd5b7707e59e8404018f0c7074fef610a48f68e274fa250e05ae89e474ceb8247