Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
72s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/10/2024, 16:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://oxy.st/d/qpbi
Resource
win11-20240802-en
General
-
Target
https://oxy.st/d/qpbi
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2964 Alpha.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2964 Alpha.exe 2964 Alpha.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\Alpha.exe:Zone.Identifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 628996.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Alpha.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5680 msedge.exe 5680 msedge.exe 5916 msedge.exe 5916 msedge.exe 2568 msedge.exe 2568 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 1608 msedge.exe 1608 msedge.exe 2964 Alpha.exe 2964 Alpha.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 35 IoCs
pid Process 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5916 wrote to memory of 3436 5916 msedge.exe 78 PID 5916 wrote to memory of 3436 5916 msedge.exe 78 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 79 PID 5916 wrote to memory of 5680 5916 msedge.exe 80 PID 5916 wrote to memory of 5680 5916 msedge.exe 80 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81 PID 5916 wrote to memory of 2996 5916 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://oxy.st/d/qpbi1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff6db93cb8,0x7fff6db93cc8,0x7fff6db93cd82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1908 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6632 /prefetch:12⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7524 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7600 /prefetch:12⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7584 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7644 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7480 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1940,14766211475152650546,13223080954217927278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8160 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5456
-
C:\Users\Admin\Downloads\Alpha.exe"C:\Users\Admin\Downloads\Alpha.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\system32\cmd.execmd /c "title hachrecode" & cls2⤵PID:5332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD54f2b64dd619e7549465160ab2aab6f06
SHA1518fe27f60a6aa82894e11ee1b8eee998dfa9f04
SHA256f72b571a4b8340dd3487716ffa5bab49cd5ff0fd42d3c8f334047055877f4808
SHA5126640d7d8555add2b472ea63e1b1a4d6b796ee94df8cf5f8e7b4b01de582c56e345b86d1a27cf780849cf4b712de69a62edb69ecc4a27be0a11dc4cac3dd12830
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD5a1e3cde5b978c2fe097b208761406d8e
SHA103ce8ad39f8a533634e54b22667e59633f4f3747
SHA25601d2dee770463641ca7c042b578dfb2ff7fbd6871b035a1987fcc10c4246dce3
SHA512a7905f1aac1b6423f5e5b211bd368f4b9ca4edbf40b08097379dfa7171ba6f6a7120407e8e9c694fffbbbcd55f0d7209ae185594f4a442f5298c3ad30ba57388
-
Filesize
5KB
MD57e1c9ddcf21904a8b633a5cebae8fb9e
SHA1f419987047e13866b692c19c993046223b748cb6
SHA25617217e1c555beb0139ad3a804f2a1e8b10f591b457ee396b3002f3403cbb1e1a
SHA512b5b9fabb95851731be96a8879899279cc1943466753160c33ba25e5521d1efc9de9d8de8c2950ef054f9bd1eef86abf1ee50e575c6f53837e77aae4e11d6ae51
-
Filesize
9KB
MD5f3676a1d68e83993d04c0f03b9ca5b99
SHA1cff34783c29b3ef25162df9f293a52f39270a570
SHA256b658c070ed497b247ae5f3bef115ea82375c2df80104095d2eeca0c70c091f59
SHA5125b776100b95c19c0b766268503c0f96838f6eb1b44108900d214230c2371d897dac5030f48f3d0928f5e40ac7620c354210c69007688f5c196eedcad78e9d656
-
Filesize
9KB
MD504f4df01ae0fa557c17b703e810142cb
SHA13b7aa8838a2d01773c22159eebf22241611fc18e
SHA25686d3370f2822f86448044cccf3fe80df974332c0569182c7c05b0f3ce8e6b81a
SHA512c9a4aee2acdaa6ff6652df8ef549d590e10311c2ec4d17fe21157113b96aba345f0366adf2ebc4055b4c51202873e20ef80f4010f7d90b9e6f1e7c38619a7c6e
-
Filesize
9KB
MD5630330c2838faeb598cfcb67a24dfd91
SHA1ee8b84ed0f870493681ce476138044ba437b64f4
SHA256ff5557f13268eb908a6604f958f5997650c0bdd3219effc16458f0c669e90327
SHA512117dc99c8624f88537cb8d58094f5cf956377a0ba256be50b3cbc8dc7a14ee0584d7c6a45c6d27cac4e7196d7b3dd2ac359bb453e5e36921feb7d6c96951ca2b
-
Filesize
3KB
MD56c96bffadc939be79c3c6e14b9fa051e
SHA1454a80bf2da323ff38cd29c611bfa061d0170ee1
SHA25605d9e7c909a7cfaddc4012829590fa0f6c4becb5deb06f1e6e3f3a24cb8669c0
SHA5129f02edbf16f0ee4c258a1e56e60ecb1d4b825f95b1a32c396ee1d62dc623bbffdef8e8533cad382a706f05fa381efc265ef8b4683ad11c402911f779cbd42d8a
-
Filesize
3KB
MD5b98e6b13fb6f4bac82f7582426037a38
SHA1628e9f9fe2913a46ad5a54c47403793fc0c16705
SHA256200e71665423f10e5f2b7302310ce354b3d151973e9d1d34b59ec4659283c85f
SHA5122433f7979beb2015b2bcc7fac8dacc43e6c64e157c8e85bcb828cb34517c40d90327d642f9e488d67fd66113b8ee5d5ca5a39c5d9c65774aaa75d1ba73653904
-
Filesize
3KB
MD57c33d038fde3119cd86f7bfd62ca19c6
SHA1f22de4fdcd60b0cbba53f9f210b8d8546b0e2cf9
SHA2565c7d6582f14e41121bcb51a86d02666793d86d27167ae6c59fa2fc8629ae8f2d
SHA51211eae7f2c268deba77a41f8de137dd3d6788f998af7bbffc59137c8389c4d9e88c25d634790ca3df271a09ca407ddf7b27394f8405f191cb71607cfbe18fe4a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e47e621b05d0642c89e9e763d2394ad5
SHA19de1fd749f4422a5802667d2f6cc951f5b302b90
SHA2565b75926f5a7f01b6810822b2c7466c9f7d50620ba61c6a2d10281f55cdeaa1e3
SHA512cdfc35f9ec3691962b763eb51791e9cdaa3e316f4e75d58ae1ae597e5fce3ba577839c9e605805cd303d68a6cbc7e9a400c3ae0af6d46db341a5ba4be71f714e
-
Filesize
11KB
MD5a875f324f038709c99cc6bf007dc8737
SHA1b47385e8b7ca2e6cb9ea6f79296fa42cacf27833
SHA2567ed0347420e48a6eb54ebfb5065d2400c06170e4cd3501ed4e5ca7f6646e4bd3
SHA512bff590be3ac4fcb8170aac90a13685772b0e6058ff589c39483c66a88695065d23a8b592c1b2dff98a855485c9016783e1e197e105c06d33b003269424b410db
-
Filesize
10KB
MD576cdf8ad97631fb597903928659966dd
SHA1fe847ba7c0c910783c0d5449958eb48590366d51
SHA256e685f25c7b1e405b4c3ad3664b87ccaddb2fda4f0621b65b2b72fefa94a427b0
SHA51270a2cc52d0186fe5d0690556d215ebf23b956e2530b3e56b79b13943ba15282cfdb6158b9da7fddeced3782293209b582226d883c172bdaecf47324848087541
-
Filesize
17.6MB
MD56b67f97e21298f21088b9c51afed85e7
SHA123162b9bc95b0e23a28441e02fc7b986a51d6b77
SHA256ebc307b848e0b8f8ed0d19c154f84675cae33620f09737e28313478152340f1a
SHA5120cb570053a338553e06527f693799248ebd421deeac8a354af207f051a696f8b81ef6b76881a0368be18dcf83e360ad0bf86a13dcd0a0665bad34940c8e8fad1
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98