Analysis
-
max time kernel
294s -
max time network
289s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 07:36
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
Extracted
lumma
https://consumptiy.site/api
https://questionsmw.store/api
https://soldiefieop.site/api
https://abnomalrkmu.site/api
https://treatynreit.site/api
https://snarlypagowo.site/api
https://mysterisop.site/api
https://absorptioniw.site/api
https://gravvitywio.store/api
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5576 Setup_Installer_32x-64x.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5576 set thread context of 2432 5576 Setup_Installer_32x-64x.exe 128 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup_Installer_32x-64x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 2792 msedge.exe 2792 msedge.exe 1344 identity_helper.exe 1344 identity_helper.exe 5276 msedge.exe 5276 msedge.exe 5276 msedge.exe 5276 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 5648 7zG.exe Token: 35 5648 7zG.exe Token: SeSecurityPrivilege 5648 7zG.exe Token: SeSecurityPrivilege 5648 7zG.exe Token: SeRestorePrivilege 6060 7zG.exe Token: 35 6060 7zG.exe Token: SeSecurityPrivilege 6060 7zG.exe Token: SeSecurityPrivilege 6060 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 408 2792 msedge.exe 82 PID 2792 wrote to memory of 408 2792 msedge.exe 82 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 4668 2792 msedge.exe 83 PID 2792 wrote to memory of 3164 2792 msedge.exe 84 PID 2792 wrote to memory of 3164 2792 msedge.exe 84 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85 PID 2792 wrote to memory of 3472 2792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/gpuf9jfaolumy61/Elec_exec_x64_v2.2.rar/file1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28ee46f8,0x7ffc28ee4708,0x7ffc28ee47182⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3992 /prefetch:82⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7204 /prefetch:82⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2224,17527292364967608185,15652835214076996418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5904
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Elec exec x64 v2.2\" -spe -an -ai#7zMap23074:98:7zEvent18831⤵
- Suspicious use of AdjustPrivilegeToken
PID:5648
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Elec exec x64 v2.2\Elec exc x64 v.4.2\Syn exec x64 v.4.2\" -spe -an -ai#7zMap5196:174:7zEvent37101⤵
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
C:\Users\Admin\Downloads\Elec exec x64 v2.2\Elec exc x64 v.4.2\Syn exec x64 v.4.2\Setup_Installer_32x-64x.exe"C:\Users\Admin\Downloads\Elec exec x64 v2.2\Elec exc x64 v.4.2\Syn exec x64 v.4.2\Setup_Installer_32x-64x.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Elec exec x64 v2.2\Elec exc x64 v.4.2\Syn exec x64 v.4.2\settings\chrome_elf.txt1⤵PID:1972
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5627422d2cdd7302d9f203bb29888d84f
SHA1c5b0e84090fcd47c05cdd4417605f33f4620b92f
SHA256661f46549b0f39f7de7d68a34aaf7234c35e2ba38ed8dd1006e69e3905aecf10
SHA51294d73282c3b66d96d284274251611c9dd64983a5a578691fb106455f2401597851e08f44615b6acecdb0dd2d9d4339d8d5b397a0852efb595d82265d8eeddfc4
-
Filesize
8KB
MD531f1149306486d3e02f1763c00f84e13
SHA1fec24862d1e2aa317dddab8ce7bc93eed824f2cc
SHA256686abb7dd707088c8bfa80297afc16a7fad7f01404521eca567b70d45f5bb238
SHA5123e3cb31baaf6d669aac8b3b5b8adffc2196882784fc5379174255d21633e9996bb5643b56fe0c30bb032ad6f0531157ea0285f2d32c3de4b1b8f359044bd37fe
-
Filesize
5KB
MD59fbe1d44e0d9acc1744e001017f493e6
SHA19edba712c7f4a025b415fb28404cae78cfd3592a
SHA25647badd5d94e023948b7b039539d1abd13288eb62e59fbeee3a27dbdabb7c918e
SHA512e327209b3d98fe7971ba6dd540ebca80f2a1393f83d1d5ccf2123355a83eb8d5d62c8afd1d81624e39f1a488fbaa2442d75a06ef95a9d9efdef7693687e57aac
-
Filesize
11KB
MD5a2b5da6f26876275914b19e7a5fd83b6
SHA11bfe84ff71d8cdca3790e933831c0bfbef76d821
SHA2560f4ee084d926207a60edb43f14179d4d0b3e46691e9d559858ceef839c65121b
SHA512b4eb31e5346320790741d325e1e7bb0862fe1072a8cb1c3a8c2e2647450db682a260f4d595d16dfb57f821999b419e893e0824389246559e2d5a10b5255b098c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5248372ffd386d2f91462699e273e5f73
SHA1921be42a350232fc650896b53c09be3cca7b7262
SHA256de5aa855f19a1f7ba0ecd06226432a580a9a75c45f3d565af1713a1c17aa48e3
SHA51296b45683db2d30499912ef0b50d65baa51364b1b833d9a7f7b28b9e9284c30df70eec609a59c64d15bc63156d41f96fb3d1f2695b8d03c0d0301711cbd6ad1a7
-
Filesize
10KB
MD5a53a584366881f8a2aa9f360622403f3
SHA19761bb1750fa755a18add39358cc834ad6655227
SHA25625b378e0367d92b8e20b2afb95f0e9a449f912978bb07a371fa75da4a83a7297
SHA512b8af5f36df17106a54680adb0bc43eb6ab16d09366e704f3002194378264bb3d58c43ad42af6b42700caa4b0841164b5bdea9e8b7b9758c6d95b29fe19c934a1
-
C:\Users\Admin\Downloads\Elec exec x64 v2.2\Elec exc x64 v.4.2\Syn exec x64 v.4.2\Setup_Installer_32x-64x.exe
Filesize372KB
MD51d2bbd3efc3de20f5db1a8938779050c
SHA162a043ff76e52b492cc260dc95dfc996245dac0a
SHA2562b485084bbd1ae524d6ab8eb9b5eb0756814cabc7c3dd33c75359a0d9fa64581
SHA512693bd40e986be5b98b2e4f53b9e177527c9af8380fc218dca73582c1d01aafc2b6a084b2e5a0b2940b7cdc551ca1f45a75fe78301f4696128748c354e40dc036
-
C:\Users\Admin\Downloads\Elec exec x64 v2.2\Elec exc x64 v.4.2\Syn exec x64 v.4.2\settings\chrome_elf.txt
Filesize968KB
MD5ddc33cf2f8a0d4fa0b96667cb037a5bd
SHA1277e4695266d7ac368a7635476556a2cc4793d98
SHA256cdac4bac1481074e5a1664a2c6437273b0a2da068ede892ed0468825429e5e77
SHA512574bc9f683a8a18b34e70d6830dcc6c0e605f3ed601f921d525f712e74ed3c83e106eb43551ab3325566e032a98a752e24407494081863dd4bc5fcd20f079bd9