Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 13:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/zb0v8J
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/zb0v8J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 4608 msedge.exe 4608 msedge.exe 3972 identity_helper.exe 3972 identity_helper.exe 2188 msedge.exe 2188 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4228 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5680 7zG.exe Token: 35 5680 7zG.exe Token: SeSecurityPrivilege 5680 7zG.exe Token: SeSecurityPrivilege 5680 7zG.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 5680 7zG.exe 5700 helppane.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 4944 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 4228 OpenWith.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3088 AcroRd32.exe 3448 OpenWith.exe 5592 OpenWith.exe 5700 helppane.exe 5700 helppane.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1704 4608 msedge.exe 82 PID 4608 wrote to memory of 1704 4608 msedge.exe 82 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 3376 4608 msedge.exe 84 PID 4608 wrote to memory of 1128 4608 msedge.exe 85 PID 4608 wrote to memory of 1128 4608 msedge.exe 85 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86 PID 4608 wrote to memory of 2824 4608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/zb0v8J1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13ad46f8,0x7ffe13ad4708,0x7ffe13ad47182⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,949565693459489539,11684299338001606803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6444 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4164
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4944
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Wave_Private.7z"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D6F2012691A69848FE652C7E12195C18 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BB0C6677A46393F089FF5DCE2D09EBD9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BB0C6677A46393F089FF5DCE2D09EBD9 --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=531588B0434C5332C74E26BD5574834B --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5308
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5260
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Wave_Private\" -ad -an -ai#7zMap17461:84:7zEvent257641⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5680
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5412
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3448
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5592
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288842⤵PID:5756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13ad46f8,0x7ffe13ad4708,0x7ffe13ad47183⤵PID:5768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5a69c145909603a88d798dabee6bcbe11
SHA17637268e94df2a4ff8cd271d7d722e0624b489d2
SHA25650de0e6dc6d1ac5039399deec900c2c854275ba04de12a67fb4d03c2da7a4daa
SHA512b9da12363007d451a3b4d0decf592b0c11048f589170a69de7031a2a38d0f0e383d1bc2db47c04b2bff12f7faf6b6bb160d642a1bdf9c218399f492e144c1a0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5fc4c72a7f5de8c6e45b0cad8390314b5
SHA1f78ad64eed4879c7ff2d138154da617064423df4
SHA256833558a008b1208ee3495ac67e945d770c901856230a3277956abbf93ed5df0a
SHA512a1bafc4f2484905c3129b873c5e2e4ce31920742cffaca3c5c333fdfb5ca7140fb969d43106c9f787a10d1bf7c7fed4e27eae23015cc5864aa03c2a74f013f1a
-
Filesize
855B
MD5416ca780807e4df3848b1360b4edb4ce
SHA19c5292ae8a1eb717e068ef3ee20724c11c890c42
SHA25674e103b04897abb68096f4b2cc2673b617a12b7b194cb8eb3bf23dce59ad1f68
SHA512c63b2dbd5080521374ad4943879cb0ebbbf602db543fc42fed131f226b7983ca68f99dc2dacaf9a16eba5ff79b6a36d29597dd865aa36f08036dc5d765bc8891
-
Filesize
5KB
MD562b844b880f115e65c657ae28ae6a6a1
SHA1f70f46ef636adf7ecb7d7cb50e3d475cceca244a
SHA256ebf2a231435cd2c06e64850abb6417fe2b7dbb3a3314879ff86638c13063ea31
SHA512310b603214696e40885472febc5c087ab8dc7c7e2f2588a45b0cbb35aa55fe047d5cd565156079a3df7f640ff6fa7d83e59c8dbb500db3c5361c445a8ccede39
-
Filesize
7KB
MD53e382c8057f688fd7584ac9c20f359b4
SHA16f9e31abb87c420479f1d6db8e3f4ff18d3fda01
SHA25634b71cea5556084eb34d84ce68a599a368aeedc921d390224a895902fffb38e1
SHA512828f8ebd696a985f67ea7651f175f31ee3c46ca4e18ccc915e1b8d3c1f9b74b07340992c084d85eb112ba038924a6979a1b312d69abbffe42049dbc26e79398e
-
Filesize
6KB
MD50fafffd2456b79b4f4c592aebf63b6cc
SHA1ad003234b577edcc135f54ea3a300f42220618ea
SHA256fb6789b15524f08842fb772b5f637dc2e3ddd914d14d59d7404bf601726e2e10
SHA5123df8f3788c94b1d57d2d45be15954c919e4d67e02dd413c153c4532155224f0ee5d89228ab827909750233307e9b637839d65f6df3e12e9dc7b16e5294c4446f
-
Filesize
6KB
MD578c7bebaaa49e668b31f5df23d6e56b5
SHA15f0bd50c2de2d0762de5cde1da544dda8a0b7b46
SHA256ad37bcb77ec3d4d9619ae41c05097dc890159a9881c2a592e0afd1fae0e6cc7a
SHA5123fdfbeda4eaff9dc58cf8434bdde7661218d13b0f0f2798dbf92bbf23b71627cb34e62f771f327f5ed1521fca803fdb494cd7b1d2764127327bc95b18256bdc8
-
Filesize
1KB
MD570fb96c71452983d6559b569c73f04db
SHA120e71d9eec4dcda1c2fa1e30ffeb72cd3f213ca7
SHA25675357e31ef8c29d02e10158cea1a216c8ad228aaf683e2edb5f043d32673e90f
SHA5128268c010fdce496eed6da71d477efe030aa24e8d18ee1e33b2c634462e7c80adfb0f6b5da8e03409b7ddacc35ab306c60604a13e0643cca26840607f8f6763fa
-
Filesize
538B
MD5026e80252a110d710d1ebbf7653abc31
SHA1d2267d9fa33aea1bb3edd4bc46c50e22a1059f4e
SHA25644fed63df93da646e01645922903d0df56a263b672c52b219d96a893f1fe8604
SHA512a7ce38b575691d1eee373b9a7e0a309088021855b2b4d7f19e0f0f69c41523229ee0b5ca8ed9a084ddf6e4bbaf5378f049e883161006331db42fe4cc8fd39be6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\df551da5-bdd7-4d78-adf4-4b4224119408.tmp
Filesize6KB
MD565c59f8351b60705f5d82d9261b6bd3c
SHA13cd933bec513fd5eacc492216b504b842dae5b3d
SHA256c0562e816b523c39178efcee3bfa29032d5a8396b29b28cbc747406203c93986
SHA51203bb7953993b50a295a380ffc6781aacfc7779a273df6c4eea7ecfe44dfcbbb1641139f6d58e58fc61a63395a25d1024cf4b7f9627be4452a00db751aaec0be0
-
Filesize
10KB
MD55fa32ea0db9711a8fd5b26ad7adf9eba
SHA12c9ee85d97cf7604ac33bbd20e94a49902379ee2
SHA25640f3c75d275d0cab0e38c2e5d65e0f5f2492fa829a8af0c311624b26cedb2453
SHA512af07ef1bf3e00e27431e39145e309d21c3923cac9af8b55bc67d8bc3eee35e7e3f99624329dff245081345880d747e7503bd123510dda7205b8ea259f7efed9a
-
Filesize
10KB
MD53448eb2f135744c2cf866beb577c279b
SHA1924d84bf4d37c073a8757b4fb2be1f35a9dccea4
SHA256e7f0e1b325c3da555370397895b0d1028da8c72ba3c4bb3668f6ddd8f9c757c9
SHA512ffef19b4512f2c03e54a6687575ceb89dd06e1dccdce361e38da26e6b3b7ae12d020641f57f2dfbc82a2a97e08c3c303073a62ab00012b7880d3f4a5243cf93e
-
Filesize
10KB
MD558341e8520d6fe48eeb61ee404d32063
SHA180aa00e3caadbbf17c601f9c93ff015ebde13b59
SHA2563a88bb3d724a9e13eaa76cc3e4a70a821117907bad39cc024828d66df08acb9d
SHA512d4333a68dafbe89c9b037bf7b92bc982f4f1cb497a7ec41495636e9c2617b19fad42f6dab805e0f878efc978b04eca799c22059c7ecf52af755e9fea07a06d49
-
Filesize
5.3MB
MD5d7422387760f3db654f5cbce8d414770
SHA18cfe3786937f33f885d273dcaee041c9c5ae467f
SHA256d7abb936e37bb3eabcf9f121b9803897b692381a17b041948a0289a36110675f
SHA5120286d35422cec1bb40e354c6a9649e56078fd1eb9a5d36e9d2daa334d09640216e9c0c0950afa569924c28d065366574e60e2413f2c37de45ff9baae17241e19
-
Filesize
450B
MD581210da44a895e925fb4fa532bcd5f31
SHA1f34a89c9bed14e99cc14ac0c5870381eddaf1dd2
SHA25699a6e41c2d9c29186d293b35975ec8b2755ede9e54641919a8bd3ffdc9dc241f
SHA5128344351945fd9de24aad524d30599b981e2d554cdde12df556f10993102b253094023790f82d3578931225cd84a38c72fb2582e37dc34a1ea218b33c0fd1cbe1