Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 14:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sourceforge.net/projects/highorbitioncannon/files/latest/download
Resource
win10v2004-20241007-en
General
-
Target
https://sourceforge.net/projects/highorbitioncannon/files/latest/download
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3068 winrar-x64-701.exe -
Probable phishing domain 1 TTPs 1 IoCs
description flow ioc stream HTTP URL 6 https://sourceforge.net/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8cff13cc5fdd9529 3 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 347817.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 4272 msedge.exe 4272 msedge.exe 628 identity_helper.exe 628 identity_helper.exe 3244 msedge.exe 3244 msedge.exe 1404 msedge.exe 1404 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 364 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 364 OpenWith.exe 3068 winrar-x64-701.exe 3068 winrar-x64-701.exe 3068 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4520 4272 msedge.exe 83 PID 4272 wrote to memory of 4520 4272 msedge.exe 83 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 4388 4272 msedge.exe 85 PID 4272 wrote to memory of 2200 4272 msedge.exe 86 PID 4272 wrote to memory of 2200 4272 msedge.exe 86 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87 PID 4272 wrote to memory of 4116 4272 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sourceforge.net/projects/highorbitioncannon/files/latest/download1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcc8846f8,0x7ffbcc884708,0x7ffbcc8847182⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6952 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6844 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1860 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7192 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,8293006224485670226,12865013187195360706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
2KB
MD5fcc06bb9f6ee42a1f7ea161861e27c8c
SHA1f9be3bf2643f677d2eb3b2a3c71d3129687fce79
SHA256d115a637a5817efab15eec67a4c465c3ab283df6ffba7d8c13c7292b3b365004
SHA512897ddc85c3aad89f224d3e66c4e9759e6d5cb578d1a2fd0ac151d6db8b8f84d0dac508f5bc7384f36e811b2a7125ed0ab4d7a821e47172d380dbf05668a47aae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD5b5aa83d275f1c2f678741e57a58d1a33
SHA1a146315a78ca47a0e2a9a48d8d7995ac13927175
SHA256442e5faf1ef18e812403e65024dd8b6d5eaeb660a45f91b9c5c56e1f6219685d
SHA5125bbdb3bf8010c059f046a95c00e6de8166096ddc89117a9bf537c38f1c9d09a0992f2aea72e70da7076172373b4f2c6a8eed9cabb1495d3aba88486ebf5ff8d1
-
Filesize
3KB
MD5118f60680e09eb3a2e6563b55fbfdbfd
SHA1bc490c040f310f250d6de269db7b3e9dc2bd2a08
SHA2567e97aaaea9d203d31a6eae4279bfd2baab458b5adf226589d45311eda22398e8
SHA5122a85f0832555cc638afc121f59556ecfcf0164a0d153ba242c61d687bfde40634d465bc8615743db6ec3d189195e4ac4a318f03e47eb97bf160045b32b285dea
-
Filesize
6KB
MD5aea6737a98a170dc1eb47dcba7636c6e
SHA1be2044bf5e1ca247fb70550280ac2665ff9ca760
SHA256bab97f17eaf685ade6f5ced63669b41cc8d1644eb07067808c07bd307ab67616
SHA512c2c060c51768c0a92b34ffae83a4db8c69dee9464b40872c07aae807143efad91a55faf79cde838a8c6f0fcd39a71daecdc038f62431301529068c8f03cf5327
-
Filesize
8KB
MD56b872b8ce0a46e5914305a1cc6f2b3e6
SHA10526352b3e5b70aed0d3f2fdde725814e3f37b76
SHA256000b575b6b63aa11dfb3b1cf996adaa85bc943c82493b416d02585362348a8a0
SHA5122a33e15d0cc2a335c3109b40c998a651872cd456aca1353cc61efe64e040e6109c848dc77d34866b8a01cb3b0443368d9e151b8156b1a4dd49ecc8402be95ac9
-
Filesize
8KB
MD59d32c84fae1e86b2ecfb209e7d87ff52
SHA159889452228aa3fa342e91aa2f5b9ba93eb64b51
SHA2567058621729e797247cc8817281c4dbf6b98eebe0d3a89d482873a3a012c1621a
SHA5121ca00dee9c4021efdb1f1d754f2a554fe3dbc2402396574f33b4d367b1761b9ea23260ea66389ddb3799f57149b7360fa7a3fe9cf21606eb6f791a3912b2805b
-
Filesize
6KB
MD5274d60f1d89e73fc3abb4023e1270539
SHA1cdc45f99b7e226174b9f93a56d05300dbe33e870
SHA256e9a4167dbb69b404f831f251207512e9260cd87c3c9331ddd2a4d9737ae6e24f
SHA51250f4da6163b2f2391433ec5355d0c615be73db4e79926705cb712a0b94abf930997eaab74756b14729862a603f4ec4a4eb5aab0d160ba9f2d3be6bc11d1bb2e7
-
Filesize
8KB
MD56090141fb2131b9de9432f2f8eb8e17b
SHA1f8cb5f88c78db87c12584a67ce0df0827c7a6d64
SHA2567806fc3825c12f4a11f75de240da56c17b2604edd9e538a24ee522e93f484695
SHA5125aa8883f359f3189b0fe2d33a35e84cfc8783d0e1fcc6d6a2a5a6417e11bff92822303909f603792f3b5e5e2da8b409c7fb4f47362163bb5e6e1f642dcaa0509
-
Filesize
8KB
MD5c42d6cd63519eadffe57a79274e61596
SHA1c669fb15bab4343b6a7e50b3215998b2ce0699a9
SHA25649d1809e2b06f7462b5f867c47b5b5a675da7c4e6cb10eccc113ad7ddcb61621
SHA5126dd7180984e1ba3296e4bc4814a81110f615cbc9cfcc7715eeb5f1bd12c9dda0623f2b1f7ad1acf27eccab54f3ec12c5c0aea9f273a98012ffc4c7b395f259e2
-
Filesize
1KB
MD53a5da18fa237fb2d7056984834b76f26
SHA18c97629aa1b4e3481dfd0741928dd8a16d6c1e48
SHA2565d3d1f945f0e63a2af79e24f9dc25ff93e608e9df05adfa33bbb93c2dd81b9d7
SHA5120d691689c5039d94a9ef5a96b249e71ff6cb2ead059693a122bd7430922884b65a974292152a7cd9d623fbd6e7b34825f246fc09ad2456b5be78eae01ee9ff1f
-
Filesize
370B
MD5ccda7b19d8e89a3b5fd345a66e0a0055
SHA1020444d8b0992a6cfc87078dec58c54febe3d8b1
SHA256b6210fb01608dde0aa8fe19d6cd9b165ec78acbab405e0366379e64df9ec0e10
SHA512b89d46afceb5d93deaf4d1948ebf86a0cc17b6274d77b14f27e9b73a2d4e958d92a8ff2038f934c9323cef1d04498ce7b016aa6ac84831d34e9d47136585e818
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD589f8e4d9402146ee9693d1d7e9eb4327
SHA1b19a84f5f4c5dffdc1b8af6fed85684ec5b36b48
SHA256ca7c40faa3ada2f077a174bc36a4c79a03d5d29979f5dce22c6113b3c5677c7d
SHA512c1aa9f1268fb1aa5f05c98ece6733644391d6560f4776cb1d45c38f356f2469d1934a10fa2b908ad93bcf52bc90e970ff793bd6e52f4c4d727faeb837cb7fd91
-
Filesize
11KB
MD5d93bbccdb8248040d3b314c6139c28cb
SHA13ab060a26209cb7ed7643a858e1cb0a2111e6efc
SHA2560c1eae0cbe425d95769b782ca234d5274046521eb9ed3039a50b02cf27ae92fe
SHA512b8ba9cd66f4a7d7e2e0c5732e838d9e72ec5667e18e0570742886a04e38552db54d64cdd5fc438034ff4027561495dd6ec4d6fbbeeb10cc0acfc64a673c96cdb
-
Filesize
1.7MB
MD5ba60fe26a85d5f5b6338d562930aeff2
SHA1499b6643dd5a7f1dd4d57506041c1207e657bce0
SHA25659e0d15fcdf92551a204c7e71776a88f54ea9df74e2ba2cfb04e7582c04dec81
SHA5122fcc74e1c44ae2a9829d53eb6f7946965ad6f8d88b2ebaf8df223c881b99066c155cc94a3c566cfe08ebfe1eded6615df410ee30dc0c9877aba1c9daa44217ec
-
Filesize
3.7MB
MD53a2f16a044d8f6d2f9443dff6bd1c7d4
SHA148c6c0450af803b72a0caa7d5e3863c3f0240ef1
SHA25631f7ba37180f820313b2d32e76252344598409cb932109dd84a071cd58b64aa6
SHA51261daee2ce82c3b8e79f7598a79d72e337220ced7607e3ed878a3059ac03257542147dbd377e902cc95f04324e2fb7c5e07d1410f0a1815d5a05c5320e5715ef6