Analysis
-
max time kernel
88s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 11:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Sn8ow/NoEscape.exe_Virus
Resource
win10v2004-20240802-en
Errors
General
-
Target
https://github.com/Sn8ow/NoEscape.exe_Virus
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 vc_redist.x86.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "198" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 2752 msedge.exe 2752 msedge.exe 4492 identity_helper.exe 4492 identity_helper.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 996 2752 msedge.exe 82 PID 2752 wrote to memory of 996 2752 msedge.exe 82 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4612 2752 msedge.exe 83 PID 2752 wrote to memory of 4548 2752 msedge.exe 84 PID 2752 wrote to memory of 4548 2752 msedge.exe 84 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85 PID 2752 wrote to memory of 3056 2752 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Sn8ow/NoEscape.exe_Virus1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956bc46f8,0x7ff956bc4708,0x7ff956bc47182⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1868 /prefetch:82⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,9655333774415248112,6768377499053911205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3984
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe" -burn.unelevated BurnPipe.{75E21740-E40F-43F0-8428-93979A3C7B04} {CE83416D-6A15-4A5A-8894-75E4FBF6C41C} 19122⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3308
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3942055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2400
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:5604
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD569ce39e97405c5991120427a3de9f22f
SHA14ad2aefb78684263a67ffb465e8e5cd2a690d43a
SHA25603dc6f3aa66a8c540da22d518dcdc7c840adfe5f01a9c269f0bb080d93b2860d
SHA512a9a17214f1cc985c72f942e48dd8789db7571b8d8bb3828f1e635306541244f46253c98b74464f2412322b590fa18bb4a8092d54c7ed4a1d22f5e839da17ae6f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5be46d95edba8adeda06402b0bff3131c
SHA1d710f4fc7d6018a5be95881ab5de2d6c8d2c9822
SHA25623df46337fefecda141793db62bb10477b71349d3a52e28eb704cfa5bdcd42e9
SHA51206ae91ef3de38d1e41c937e6713afd8db6c396984887352259e018fd463b81f345cb4343da0dcf9a1568937c8ff1bd5590e15fa7028e23baecdff837d332862c
-
Filesize
496B
MD5192cfe5a83dca08833f05bed98d64ade
SHA1e63933587e3a4c5e1b20a4beaac7734dcff5e865
SHA256459dc773fecaefcfc3461710dad24a417dac4198976961afcc798ac9b0a8013c
SHA512eb1af326fb1aa7b9cc43d32672df28ed0fde9e91e626cf73b693dbdc2b66e9de98506b4d0784a913382be0af6a24005a3e3b10ddfab168bfe10aec135da6a5d7
-
Filesize
6KB
MD5543d3d1a0906835ce0705bde80e89e32
SHA1996a1aee4e4462673b5fa12695d2c832d7800fea
SHA256a7ffeb8340cb73078cd1dd98ebab2dc0bb4b9dbdd5c3013997eb9ee6ede15948
SHA512fa75a485d1e848a51d4c597d8ed5446bf741c0b99497581358e053e33601b4e49073894beed1ce93c691058f672d6cb6c329a3af41a24025bc72b69003abfc22
-
Filesize
5KB
MD52166e45fdb20dee351fec5ff7120bd0d
SHA132bc26bb5102b27597e9da091d95fe4d1a389677
SHA256ff589722cb7bfed09d126b844cd17c840c03f500ca63e1b8c472cbeeaf27598c
SHA5122a7082dc7e48b94113ca92d19301379518d8695c7b5c24db316eaa009b14a7c32cdff6804fd13988431dff4c79eac9fcbe017e230e8b2b512a9f85c73f972d3c
-
Filesize
6KB
MD5769aac2b72f9b9fe5a7770710fbd7036
SHA1a8df923158442c64ed9c75e9d7ce81ef1cdedea3
SHA256917e348a915121fae93cb963cdf03319676b0eacc6548103e0119ffb9f4ae35e
SHA512468abc6ea8795b055e32181a1bd1dfa345801f9319f82e5e5adc3afb1f42a8a98f0e9221b8e077244a258d3cad676a02fc9c6af619baf863c96e63ad18e023e2
-
Filesize
6KB
MD5880e52a5e39c2a39e7df156e307f1f71
SHA13c8ef922c24ea9f2a0a1ad2182d41495175a4186
SHA256808e588a9de8683cd7f63d3b9598706eb3a320c3886319911656eb889c07adf4
SHA51208f2698901b615fd045623db33aac45ac273f9efa03e3ce6f6a04ff42512b5ff20b6f09f094b3c864992ec26ab957a2bfa6bf5c5f50e79e4ef35ed9eda2ec9ad
-
Filesize
874B
MD5041ad24e4f10269974d264de753a8dcf
SHA1b87edf13b85b799c76a7a12a0dc190a0bbe9a715
SHA2567ff35ec756f12adee300449cc5fce0b1f66770136759f4d5f1b61d58055a6359
SHA512bd9da19d90d91672e99f0606f097ab7c90628666f76b61b152bdaec181200b6ab31ca023e0f67f3cc8b1449bf1ec13cf1134f380d7e64008e9b38aae70ad85e0
-
Filesize
874B
MD514e8dd61ca2728ecb7c7504c2bb85077
SHA10d88450bcf9728e8652736f36924301e137d83fe
SHA256a28a7f5b01a88137619fb7b62bf57dd0e22f50719f45f6d27d8508a6f884ab8b
SHA5120d346aa1772ae137f902ac15f5483a659f6baac9bd758d8bff65dc935b65436155a905a688981bf30f4a61e76a875ce82f6b42cf4b491590d4d813203507a088
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5974da8c864aa20d21f5cca2c6e7e7afa
SHA1a1f2c8691fce284bbfa43d5376213cb944f35167
SHA256a3b92fee3ae39354998315da5186a0892e0c50a3a98d0559bccb1d026542ce2e
SHA512d07d7b5cabf3ec8aee4f240d196974693dca3c01f17b9d04a9f4e5ea1e552a646e574de1214287257b5f600bc85192854b0db3d79cb9e68d546f60bbc7948894
-
Filesize
10KB
MD59b2766cdf10add09c53933e3df600bc4
SHA1d61314c18685f01e723809219f80616a71905777
SHA2566d385c9158ccf4e179eb28c9e6fb10a995e8af51e53519f2316406e76be204f3
SHA512095f08c042e5ee77d134b03b59e6fcd1fa9a5e3ca06188d46a7312f0921b7a0d589be627fa548c298bda91c3f1d4be1b10d658ba3096f525c26e9cd4d69795dc
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2
-
Filesize
13.5MB
MD5660708319a500f1865fa9d2fadfa712d
SHA1b2ae3aef17095ab26410e0f1792a379a4a2966f8
SHA256542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c
SHA51218f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4