Analysis
-
max time kernel
111s -
max time network
110s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-10-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
stellar.exe
Resource
win11-20241007-en
General
-
Target
stellar.exe
-
Size
1.4MB
-
MD5
54d5b00ea9a965086f9cd624cdaaf5a4
-
SHA1
b94f1e2165d24f1aa14d70e7255d0ee6ad259345
-
SHA256
3f314bd4943b7826f304e2b1af1afb4969754fd6ab48b33c95dad076cc06c067
-
SHA512
aeadfa9bcc28bc5c23bcadc6d25ec81ce2ce92201ca71565ce0146bb4cf1cde963c68cfd6bd22c688d79cbc57c27f4ae2175046671e96851a9130405760c5993
-
SSDEEP
24576:RDwCKsRIdB3tN8HZwh/rqjx5MguVgZQ9nXvsB0eTmWd+sYwaH:pwvsRQxtKarqrMgAnXdt
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3332 CryptoLocker.exe 1132 {34184A33-0407-212E-3320-09040709E2C2}.exe 1028 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 raw.githubusercontent.com -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\CryptoLocker.exe:Zone.Identifier msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 47352.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 161708.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\CryptoLocker.exe:Zone.Identifier msedge.exe File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:SmartScreen:$DATA CryptoLocker.exe File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:Zone.Identifier:$DATA CryptoLocker.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4232 msedge.exe 4232 msedge.exe 4448 msedge.exe 4448 msedge.exe 332 identity_helper.exe 332 identity_helper.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4452 wrote to memory of 3924 4452 msedge.exe 83 PID 4452 wrote to memory of 3924 4452 msedge.exe 83 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4404 4452 msedge.exe 84 PID 4452 wrote to memory of 4232 4452 msedge.exe 85 PID 4452 wrote to memory of 4232 4452 msedge.exe 85 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86 PID 4452 wrote to memory of 32 4452 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\stellar.exe"C:\Users\Admin\AppData\Local\Temp\stellar.exe"1⤵PID:2256
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbe8803cb8,0x7ffbe8803cc8,0x7ffbe8803cd82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6360 /prefetch:82⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,15751282384137530705,5549955216506593950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3332 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000023C4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5afba8f60c1f7572e97688217c4b00c74
SHA10e9c7866b80325648e5535356195417698b73113
SHA256faa2512f5404c5e183e66f7cfd26e32ba5386c665e40126c4fbab1949dee2598
SHA5125e1739103c9a7cabbcf07bb3c85f412909dbdf0a0d1ba4ef05df5f45495806b0e6b5a81b39f7d99410ef6a5b988f6f31136ed231c711038f659140c07d6a0781
-
Filesize
981B
MD5650018409d81175a71a12f21a20a8102
SHA1540bb7f4a61468154bede01aed0935ab38286e87
SHA256948133ec487c9b192527b393b6b06816f08687c25d816d9bb05da1fcf7ee74a0
SHA5129c5e1423199834c409ed9a5fb18242b48cd24d5ae0ebb0ba085736cff982a0ed0bc1e2752ece8f63ad668a2af32961e217360c4ca90ca8018adc12787fbb53f2
-
Filesize
6KB
MD5d740675ca4ed37367cfb9fb85d8ba3b1
SHA1669ab658d456a7069ee165b2f4a816531b4fbcb2
SHA256112303d833ea5d7d3689b03b3d08d514ee0fef402c1509efa76a40a2f46d5b11
SHA512d22b3c3042f071d94c1cfc27aa9259f749d37bf377aac5e2caca6b286d3eb112ceffe09a0d6ed9af180a22bba19f8169bfff1b7dcf31aa4736fb47ed1941adaf
-
Filesize
7KB
MD5f3e72e99d600b6bf5efc394cc49f6d24
SHA1b25b378d2eab62b2a6753407818ff6fd6751bba2
SHA256e6f111e39d3ecf2eb24ab0e64efd640cd2c12d3181cbf2129bab48d86bdc930a
SHA5121e7e2260d6057fce6a92569726621217bdcb23fd96c851d8699f2adb4aaff4b812f1966a6fbf93c924a17f50df9b3c341a8d8143c3cd81f8f5b82675224f1307
-
Filesize
5KB
MD5b4b77f38b884e70c437c1b8c92c4eb87
SHA112b5b68ad43de8e8b23f0d843f10e77ec38df9e8
SHA256ba57aafc2748ff162335286db417350e48d46d172ebda3b5c760ac7bdebbad14
SHA5125969a691332b8a97b7e1ec57cfb5da3209142a1c3cfd05c7ecafff4beefe42cbbfc5b43adc124dcc627b6175ba6a75ff39caac1b470a7c37aed60d27ef83390e
-
Filesize
5KB
MD5e74ac9c2b837ddd92a5b75238e2b6d8e
SHA15dd1b8c501257b310d42490e04c5a2621baba3aa
SHA25637004fddd88aa89814824f3671c28d5027f26f5d125de2c1d54154294be5beaa
SHA5128e09f392212954804fa7294d4d69f0abcead702f67f79c94cdd0d2c280b9b28a1221707710c6afe723103d095974c68c5f1ab7a583301d107715878306b10e8c
-
Filesize
6KB
MD5ca6cc129ef968cd33a1f746b0a23c85c
SHA19795e717caa31325450b4ecb6d17d394b789cf9d
SHA2569fd942138d064a07bbf2ded59ecbf8cd1827f31f6570d803c63548503de067a1
SHA51293d732557cfb9d6e9fd30d7498721b85ae8ce5cd55614f8ca0240a69e91cba18e3d9bb763061f00554f80178105d4932fd62276df43279fd4b95a1b9db44c8e3
-
Filesize
1KB
MD5bdc7435009c93808bf88ad8c17b6d94a
SHA1f16e6c2da2fb1fa37d7fd55057ed52a23a206e62
SHA256c15d732104c24fe4c09a5c51f53f4d0c2f277e557c4534fc5ebbc8a798ad58e4
SHA5121705774930a4be444017152e41ee43be3b89d55eff9893d43ed1318cfb472c43ec2a06ead11f74d4352018c59f4735dd681d48adf7ac34f7706c5035bf9836f3
-
Filesize
1KB
MD5f4f950cb1679b8ebeeb5fadf2bd38aea
SHA15a6687a3a93cdbaea62f2194d98ce8879bd9d9f8
SHA2565675ffe158911088a2fc21e5bf018acf397d3252e6dc10f088d13dd80c214118
SHA5129b7a901b188ac149554ace9b033d75519630565a9978a1f05a02a7764b6344bbdec59dc54856a61d72c882d3607d7ac7a0f3697502a7e91715d32693a8e49d89
-
Filesize
1KB
MD5aa7403e224ff8ba83722e5726a2af116
SHA15c7434fdd4337da70fbee0e24cfbac1ea40d6b30
SHA256a9e535e2f4663bdb781802668ca5629efa6c3f4b0c03746537b583ab78c5a86a
SHA51262bfbb75fd34655de35d5d7b0ff3622ca72aecc1dd5b5d469e5a6192acce9c0295fbb9082cf678ab88225337ee81caa58577d0d6512e855049c4746df63f26ba
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD56a17241645f9fe4fba790453a31549d6
SHA1137ab2ab6ed107b1f7531d85e79575707db87616
SHA256a8481c2c7d8d22c04b118afc6032749984efe6885d911a574815bfea651744e6
SHA512f2f1028e121c4b445e55eb3ff1de55204c484afe68d2a833d9eda667e6f6af17f1a32dc030c8676acda2a9b31d6c65edc002b83d3f15a9b19190217b6880c173
-
Filesize
11KB
MD5992904bd6c8986c165c5c79177b9e84c
SHA1d9edff092c093a1bfa712642d0c9166f85420e36
SHA2568da4d6f6de0ef188bd97962cbdcfeed482360e4f814699f99bb1e89a80bdb961
SHA5120a11cc67de315753becdbfea4d21f9729760762730e2f040c34786ee59d0f4f8cb6d6b8d843ae71b9a20e1563eb4f07e36a86329f19f8cf53392c05713b583c6
-
Filesize
11KB
MD5d67bf2b17052d66e4cc1f35abb90896c
SHA1f57bf1e18e97a5a400c4415b1cf171effbbfe175
SHA2565a8ea8be4d843b8969c733ca26554e98c68eb435a4be04d45e7ee8a875089db0
SHA512e25564a3d0d13ac018b13e18bb5fa672a4cb7f23744d7e791d0d262196902d18c07399f69665c9c7838b53aab0d9259218fa475525af3e195b800008893825ed
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444