Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
Resource
win10v2004-20241007-en
General
-
Target
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
-
Size
1.8MB
-
MD5
18cbe55c3b28754916f1cbf4dfc95cf9
-
SHA1
7ccfb7678c34d6a2bedc040da04e2b5201be453b
-
SHA256
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b
-
SHA512
e1d4a7ab164a7e4176a3e4e915480e5c60efe7680d99f0f0bcbd834a4bec1798b951c49ef5c0cca6bea3c2577b475de3c51b2ef1ae70b525d046eb06591f7110
-
SSDEEP
49152:Eau0Bnly1l8B6hLa5vMIKHVo5W1v2mS0la98MT:Nfy1Wo+JK19eFE6
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral2/memory/208-66-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/208-69-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/208-67-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4692-77-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 8 IoCs
pid Process 4128 Yt8ge85.exe 2640 GY4IC43.exe 1528 hE8Zq97.exe 4092 1Zn59od7.exe 3844 2PO9885.exe 4960 3FD62NB.exe 2264 4Ii975UD.exe 1444 5uR3lF9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" GY4IC43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hE8Zq97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yt8ge85.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4092 set thread context of 2020 4092 1Zn59od7.exe 91 PID 3844 set thread context of 208 3844 2PO9885.exe 96 PID 4960 set thread context of 4064 4960 3FD62NB.exe 100 PID 2264 set thread context of 4692 2264 4Ii975UD.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 516 4092 WerFault.exe 89 4220 3844 WerFault.exe 95 2360 4960 WerFault.exe 99 2844 2264 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GY4IC43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2PO9885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3FD62NB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5uR3lF9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yt8ge85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hE8Zq97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Zn59od7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Ii975UD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 AppLaunch.exe 2020 AppLaunch.exe 3632 msedge.exe 3632 msedge.exe 2976 msedge.exe 2976 msedge.exe 1172 msedge.exe 1172 msedge.exe 1572 identity_helper.exe 1572 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4128 4912 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe 85 PID 4912 wrote to memory of 4128 4912 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe 85 PID 4912 wrote to memory of 4128 4912 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe 85 PID 4128 wrote to memory of 2640 4128 Yt8ge85.exe 87 PID 4128 wrote to memory of 2640 4128 Yt8ge85.exe 87 PID 4128 wrote to memory of 2640 4128 Yt8ge85.exe 87 PID 2640 wrote to memory of 1528 2640 GY4IC43.exe 88 PID 2640 wrote to memory of 1528 2640 GY4IC43.exe 88 PID 2640 wrote to memory of 1528 2640 GY4IC43.exe 88 PID 1528 wrote to memory of 4092 1528 hE8Zq97.exe 89 PID 1528 wrote to memory of 4092 1528 hE8Zq97.exe 89 PID 1528 wrote to memory of 4092 1528 hE8Zq97.exe 89 PID 4092 wrote to memory of 3708 4092 1Zn59od7.exe 90 PID 4092 wrote to memory of 3708 4092 1Zn59od7.exe 90 PID 4092 wrote to memory of 3708 4092 1Zn59od7.exe 90 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 4092 wrote to memory of 2020 4092 1Zn59od7.exe 91 PID 1528 wrote to memory of 3844 1528 hE8Zq97.exe 95 PID 1528 wrote to memory of 3844 1528 hE8Zq97.exe 95 PID 1528 wrote to memory of 3844 1528 hE8Zq97.exe 95 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 3844 wrote to memory of 208 3844 2PO9885.exe 96 PID 2640 wrote to memory of 4960 2640 GY4IC43.exe 99 PID 2640 wrote to memory of 4960 2640 GY4IC43.exe 99 PID 2640 wrote to memory of 4960 2640 GY4IC43.exe 99 PID 4960 wrote to memory of 4064 4960 3FD62NB.exe 100 PID 4960 wrote to memory of 4064 4960 3FD62NB.exe 100 PID 4960 wrote to memory of 4064 4960 3FD62NB.exe 100 PID 4960 wrote to memory of 4064 4960 3FD62NB.exe 100 PID 4960 wrote to memory of 4064 4960 3FD62NB.exe 100 PID 4960 wrote to memory of 4064 4960 3FD62NB.exe 100 PID 4128 wrote to memory of 2264 4128 Yt8ge85.exe 103 PID 4128 wrote to memory of 2264 4128 Yt8ge85.exe 103 PID 4128 wrote to memory of 2264 4128 Yt8ge85.exe 103 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 2264 wrote to memory of 4692 2264 4Ii975UD.exe 104 PID 4912 wrote to memory of 1444 4912 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe 107 PID 4912 wrote to memory of 1444 4912 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe 107 PID 4912 wrote to memory of 1444 4912 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe 107 PID 1444 wrote to memory of 4864 1444 5uR3lF9.exe 109 PID 1444 wrote to memory of 4864 1444 5uR3lF9.exe 109 PID 4864 wrote to memory of 324 4864 cmd.exe 110 PID 4864 wrote to memory of 324 4864 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe"C:\Users\Admin\AppData\Local\Temp\248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hE8Zq97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hE8Zq97.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zn59od7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zn59od7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 5766⤵
- Program crash
PID:516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2PO9885.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2PO9885.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 5726⤵
- Program crash
PID:4220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3FD62NB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3FD62NB.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 5725⤵
- Program crash
PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 6004⤵
- Program crash
PID:2844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A5F4.tmp\A5F5.tmp\A5F6.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffb335146f8,0x7ffb33514708,0x7ffb335147185⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6311569079062895809,11459574716343879426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:25⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,6311569079062895809,11459574716343879426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffb335146f8,0x7ffb33514708,0x7ffb335147185⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:25⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:85⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:15⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:15⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:15⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:85⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:15⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:15⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:15⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12426729460829516714,4657684761491905081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:15⤵PID:2940
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4092 -ip 40921⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3844 -ip 38441⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4960 -ip 49601⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2264 -ip 22641⤵PID:3092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3c79e9cb-717d-4698-b125-16e4d761739e.tmp
Filesize1KB
MD52590e97c1bc81b97e3736e59a9071744
SHA114454a08488e1dfef809cf0a4c4ee7e2f620f73b
SHA2561f935bea1763f0efef03ab2b347bdd20ae4d1e4ab72878d207ed014dcc76ace9
SHA512e1a561989cb3839e551b0adfd2d377bd1a1fefb39e18d4d7194cde4818551ddd75976348eeff97717e702bca893995ad25594413364a4613db83e15a41b7a6bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54c7000f527bd954f43a56c1940520297
SHA1c734959bb9017493f332f189f305cc487bfbe162
SHA2566d729cb58e43f572d3f8be6d7f63ec36c912d841dedb37c576994e8d8247234c
SHA5121a750ecc1129777c8b68656a3814900833c802f0a734f9bea6f35ce0a1f67fa944c40fad2783d6c9d8155b39d9675d58f08e4c94dbb8361f62b3fd7c00563409
-
Filesize
7KB
MD5f81902f2398f110b7574e52a42de2fc5
SHA1175960f092d23a478cac9e6045523b3fb427d32a
SHA25698b7a83fef0d0559246ffc24d26d2f52d177d5b405ae5ab6d6dfe6fe3d725516
SHA5125ba72a19fbe2d60c28bb5135780b01eebe8de1cb4edbf17f314425b5ae3ffc6df048df2b10d9987e0f7bc671f349e3f5c15ed174763d027602bce0ac519bd607
-
Filesize
7KB
MD51fc05c3d00c67a222b56c8076050d68b
SHA131bf00f10cfe19df92e19b037777ef3f7e6a4474
SHA2561fef48d209688c19441231bc1cee3db5cb08ae0262118f129814df993f4acb4a
SHA512557dd7b70d36e4a83350e8029ca2939fab9a1acc5efb37189afcd2016d5fec002671ba258fed115590d3b7fa8b45c1482ff4782f899fc3d40e7ed71a297dff75
-
Filesize
6KB
MD5943a6e790cdfb8daed5bf253954ae6c8
SHA150966ce9b2afffe08db10264b29b8673b41f5413
SHA256b1a5c6d52edef0f21f39c9ef288adaec7a6559a4fa5a69f61cda7eb1b692dac4
SHA512536353fe6c0f554a115aebdce4ff427d879fbf6b77cb3d140c3ed5a1b476227d1ef0a273f35648d318219144ac115e8525156bf4965e0f921c35d86d688962c7
-
Filesize
872B
MD5ace3f204f17b7144d9f8378efc0ade5e
SHA15efc1185e5e7981686998d2941035f6923a4c894
SHA256753d331304e5a12be0fe4b2845ba0050c834da7767493f0d9b55478198fb8edd
SHA512c44aafca6ce8b708161f92e4bc714321600c2a4f3d3b70d55ea79eba2b219a0e9a904abb7082ef46a2559e830ca5569c0852c4bab258d3c68e1e7027a6b0c55e
-
Filesize
872B
MD5b63786c6e2a2277f0144ebaf65cc2589
SHA188a92571484f092842c8d8b86549516356c2bda1
SHA256335b6630c7b6fd8eb3009b2bff018b283398fd1cc22065edae08df625db02ab9
SHA51291639d87ba004490ad1964f163e32f24117f612c388fa3b6af4ead5a1a410fa52a7156d69ddc3366d3a2b66d6944407a4fb8d445edd071076ca9ba85c7f18acf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD562c6de976125109473a07566defa3f4e
SHA1ee645ff7c89af83e32db0636d1e3ec092419b699
SHA256e3b865c1c80dfc3f300a3134093211e0a5bb56a0e7206aa235b83da230a69a43
SHA5123128ffcf8883776534e032470201e642b1873416ec45dbc4991ba712c0359ffa0a539005ff3b731a3ab594d9cab4fcedf72820677ba646e90d71434bd2ff6f17
-
Filesize
10KB
MD5894dc49602a78aa003157b05825477ae
SHA12a2f5034010857bf04db0a5333a75dff3b5732bc
SHA2565f43b00e5f860fcd3703528babf2e958e3dfbc0af967b864d3807163fc595337
SHA5122a60ac6c380e4dff8176879f90c362934cbc8aa13288f970dfa6aa67b7243330e4d070e294a46fa8e0249f8f62aee6c61cb298bfdd03982c2708063ba2af497e
-
Filesize
8KB
MD5359023de593401ce8ca2045a0d72610c
SHA1013bbe200017d3b6cfa2bdf363cc4e693ef082d2
SHA256166aa09a2747d5a01dd7ba50fd881f0e594b999e27dc2cd9b4e749c8c7b273bc
SHA512af0dfdeb24d7927429287d6be22fbfd7f28b7c93cb1cbc672590f9569daec854dc61552ae00cc42e7a596146b66ed1df8e13ced922a97ea98686641fd8fd8c87
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
100KB
MD5e0f8b21b36fee4e7738a6b5a1ab83673
SHA1e305d55d4d47bfa62eae5f8e6f34e5b133a6f40b
SHA256c567d825d19e24343647ed36c77033fb1f46f420384745a9734618684cb7d384
SHA512716e6624ff87c859d08e2bbcda1137a2386d30b5b9ef545daf2c6585bc3366561773b9ad6c719a1ad99f1bacb219544ae4556629b355250e2234a7f87d24e238
-
Filesize
1.7MB
MD5847ee3021803e4adaefcc00aa8283017
SHA187644df0985b5ef9791c72ce79f423350629659e
SHA2564611614d9c95b0d0e4bf4aa486cc700db6e49dbef7fa2726b20f165e6798a9f7
SHA5121aaea476c061160439439d2dadc05e451166faa5614ccf8960b592df6933d07c867ab8813c08026b8b2c35b20b03dc0d26641e228fe06cff8c4938367e515b38
-
Filesize
1.8MB
MD5cfbb3be155b12d0cc69e3d932fbb81eb
SHA1fb5ed48a80131043c4dd2e4ac69b4b38578f9753
SHA256fd37c07f519f522eb717a372299525f667439b8b0d1aaffb670a011dbbcd58f2
SHA51238aadedee5bd57c7f475e96d74abbb0e671bca462c2c700b7a034e2d1513bd8aebc30b7b75bf1e8cd7b7e3a831e69d5dd0ceaee3d18ed296a2cb3d1b051164cc
-
Filesize
1.2MB
MD5252043d1805587b0e65a07f885d6719e
SHA12210de44be60ba496ea5d4068e715c1308066989
SHA25666839bc22b9c9f717198cf8faa64146fe95dff51dfbb8c0f61982f2e50e89557
SHA512dbcdb0b6fe37cf2c733b6683c2e245008400c84b59450f34a794e513955aaf392982e20f2eb2fce696eec2574fe15f699841748a21fce6a1e20a4381fd52f950
-
Filesize
1.6MB
MD57d377f5e1ba6597ff2cfe4f92639367d
SHA1188ab803c9926ff3448c458030f418099ea03407
SHA256c705efd2888dfbede96714b58aede50a28b3da45aba83a909cb104ce34dc735e
SHA5122adad69f3a358ad955b00c8d7826c396feef9d583407d4c7d53ce3e16ed760f148f553f49df5bbcd6c5c68b87bcf7e1472d3c789946b23dab7ae94b4036540e6
-
Filesize
725KB
MD5403a939a04b4384204d35dbc659bf772
SHA1a5424bc4b18c00fd261d71861fad75502a963397
SHA25675d5ae4d95b66cb33ccb1b8c39adda5b287ab6c44b11aa42b8f3351024fce1fc
SHA512860d17990d95694bd7e799b22e6af6fd93a20276439829e945f9aff079b6c708851e8b3e55200b8ef97d41d91608911a414b4a69c26e5593b9b4ca8a134ddbe8
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783