Analysis
-
max time kernel
390s -
max time network
372s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
252KB
-
MD5
7df5e87056a4001b690c889cf194531b
-
SHA1
d4506dd1fa781ac343f93a8710d38c86a3e863eb
-
SHA256
bc599f97740d6221f36c64234c5b476cbca8ad2a0117f101e9ca9ae74bf41c47
-
SHA512
6481579e5d8a413c58e1689e5bff55c3af2fbb69eade00b23026b6723178eb8421cac29fc939851a060e1bbb0d815c61281a4b9fb0acfb0ee8b354827e86fd6d
-
SSDEEP
6144:DCMkFT/LVxBA0PLDjgvQZBVzdI/INiNYuz9AX37uk:DC/LnBA0PLD8vmBZdKy4suk
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4012 Setup.exe 1936 Setup.exe 2536 Setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 Setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 177 raw.githubusercontent.com 178 raw.githubusercontent.com 1 raw.githubusercontent.com 2 raw.githubusercontent.com 175 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 Setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 55646.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 3036 msedge.exe 3036 msedge.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe 1936 Setup.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3928 helppane.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 3928 helppane.exe 3928 helppane.exe 4012 Setup.exe 1936 Setup.exe 1936 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe 2536 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4444 3928 helppane.exe 98 PID 3928 wrote to memory of 4444 3928 helppane.exe 98 PID 4444 wrote to memory of 316 4444 msedge.exe 99 PID 4444 wrote to memory of 316 4444 msedge.exe 99 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 3236 4444 msedge.exe 100 PID 4444 wrote to memory of 4036 4444 msedge.exe 101 PID 4444 wrote to memory of 4036 4444 msedge.exe 101 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102 PID 4444 wrote to memory of 4360 4444 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵PID:3260
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:660
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288842⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97aad46f8,0x7ff97aad4708,0x7ff97aad47183⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:33⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:13⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:13⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:13⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:13⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:13⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:13⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 /prefetch:83⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:13⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:13⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:13⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:13⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:13⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:13⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:13⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:13⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:13⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5820 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:13⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:13⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:13⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:13⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5920 /prefetch:83⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:13⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7136 /prefetch:83⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1840,11140979633057759780,5886495210065990323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6776 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Users\Admin\Downloads\Setup.exe"C:\Users\Admin\Downloads\Setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4012
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4328
-
C:\Users\Admin\Downloads\Setup.exe"C:\Users\Admin\Downloads\Setup.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1936
-
C:\Users\Admin\Downloads\Setup.exe"C:\Users\Admin\Downloads\Setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5f9c2963360233d5ef70e8b3ab860ee6a
SHA10e4a8f67459ff7c489ac2cc7c7803164add0c2de
SHA256ef0481ab8f9402632b70d98c5601fe2e294eb1919e92da0f49c1b0f4257ed594
SHA5129ab74833b6e5d7393494a91a3a1d968ae6438d79608271f44f94b200808ae670fd30110f31fbadf18865ff3dfbaf3d32f1d59de8381f7f8d85ec2941cb622133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD525c2934a705f341212497e78e639b0eb
SHA1a533fd4162613dd5b163f8ef6d8fc5c8355814af
SHA25660cf2201d421ca5c38805ba78ba4cb65526d4db281aabd64591532cf44a1918a
SHA512a26e70a3f07f543aa6f2ba4e1443e373e553f367b87fa68079001793c2a9548062588be13920abf7fbc71680a4820d1f61173f7714be6986e523daab898d5185
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4e0c3dde-fc48-45f1-a74b-46d47e7df4fa.tmp
Filesize6KB
MD501c36b6a3dcb7a46bde3623e90feb87a
SHA11cd38d8c92976927dda68f0b68bc0d1c0d838b6b
SHA25623730e97d038b77dbd57b470df492792b2e7743281d26c4f645fcc873cce9d07
SHA5128f40f63003609b2f8d17b9eced20fad91d0b967d6ab1cf9fcf854119eca37d75983c823ecaf3d00d93ddb2ce33e19854ff28eaa34cfca254abe8ac1357e46b77
-
Filesize
2KB
MD588752d14f4596281cd9481dfd349c281
SHA13d970e6b58ef3e7db881e0806f97956d43f47822
SHA2564409c185f9d5fc8d574e324fdd297152f5c1bc117d49e7b4618f5d183906dba6
SHA51238a7e1aacc928bc070f52f2a1d9452808198cde04489d8862d21c4234800d80ac5d6b654bef85110f22bb7bbaa610a0db5535b8b89c216946a5fc42b8f5341e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a06c845a1bd2d2cc8a82817496b9418e
SHA13548639f5ed7423a5697e75b6a08876660d314dc
SHA256e76bd91be9cf98ca25a5e53b757a5de4c60a4a6aaed582bb53f15af7ef09738f
SHA512fc46556f18bd59c4c55eafd7fbf8d42cca88ccb675b63a559132d17b7d4d08bfc533a88779aa33ccb5d9c02774de95eaa1645179e5f4bb81cb88787d7695d97b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD53aa2d2972343805ba7b9faab91e3c208
SHA1782587fe31ac4ab11b7a9b0fd7d9103d8ef6ca67
SHA25682ab9ced06f45077846f21ea5305017263a7cd7c9c2a14701c3c320408c90798
SHA512d68045c2b67bb1158672e08ae0479f4f2ed7270fc7abfae59c12dcf19493b85b795a9437e3f1aabbc8ccb3b01afec6f7eb8a7c4363b5a619a51d5cb53df83569
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5af81dbeaf7f69d8265ef9e1de0a466de
SHA12244d38257c9e0757934ad4e3cb1628383c85eb0
SHA256f0def3e61a4aa20aa768d61357e11c52d4bce0a3ad3560a26d9f12711a00e23b
SHA512c57c762e78e3cb314f89f39923e78e5643ba84727867a05d769a97dd3c0d25f697c1c9ca422d0c0d567777301eb3ad1e199fe33a876fe5d28052ffdb90adb315
-
Filesize
8KB
MD5194f8fa023384995a501faf09e3faf75
SHA1162ad7afd9951b13c8c10c0755bc2c5ecbefdddb
SHA256c128c3374430bb0e7bd1dcb7536ff08bc16f1abf97b8b6f82daeb19f08f9566c
SHA51269369f9938ef9a83ada6e4f8633b1f70112ac4ed5ab289c58e6b2b69d39610a8fe0f8e4b4370898cb61bd56ed49eac0a60beb89935beeb66573af408c02e4681
-
Filesize
7KB
MD5a5f4cbbcd21bf2a410cb1fb1e5a92396
SHA1ba2f92dd349f40f5090cdf2732408efc980e4e73
SHA256f9340ab3e3e0e02a11ab3f2cf5cfc561fc4fad0d0fa14a3f9a657faedb6cd610
SHA512d1d72c0fe6962f8c92f8ae2b05218dd76e5cb1761085400316819c48471fe195aaacac8fffe8d804db0bcda5173ae0a5e02aba4f3fdddfed992617351d8b55ff
-
Filesize
8KB
MD55d356036831846aff008cdefa8022aef
SHA1f8175f30cd4c44d428c24a93267316a7b0cd6995
SHA256e055ceee3418400296a1d3dbaf9835faabc492c2021cbe02009eff0145f94a96
SHA5125092e752db87dc0dffffc30ddde9333244faaca2ce5b1d483b429dad5568e2b9cf4f3abc4d1821efabedbff16ac7757e71ee80604c6c6845abf7f21fce3e987e
-
Filesize
8KB
MD5d8f159aaa17ccbc59e8be44c71cbbcd0
SHA14b2139b136dbb25536ca94ed79acb6d12c08fabe
SHA2568b01494cf7137b720f122ab975385874e7e7553ee0c942c93303a1a61de7bed3
SHA512906a22047beb6dd4bb168d8da2f3adc6391aee7cd6037b026cbd1019618fb511802b4328751727774c5214366a82dd3cc1d89f69b674b63a258ce8c934e8cb79
-
Filesize
8KB
MD5bb056826ed93118e8c4529a125b65896
SHA1da5039d572090ae629e12a9d491ed6f4448eb279
SHA256eb1c2243c5b25edc1b24138d18904fd8d9081910fdc7aeabf0ffdf3dd774d685
SHA51272f80e20600db64249748fdb23decb2086a2f9ffa833f916fc4c079efdac5d7e6f8513dc7bed13ac98072da09cc21f899efaf679742711fb3c76ad964f70f449
-
Filesize
8KB
MD511df0d84118f73fa91a3fb011de94426
SHA16d4288d18bab28ce1218f8fe675195bf285e0e1d
SHA256331a35bc3cb0b4bebf9a6433e8b12c8daf388fdd6e5b7148c1a00253d737dc66
SHA512ccccfcf8a0195d9787d3034aa888144b0c6e989e15b7fb791ac55f6e3fa4f30b1585bdb42094e25fb1e3e402615edbede1605819ad50851da979bcd269949c53
-
Filesize
8KB
MD509be48369d98123e8868431b84347c27
SHA193c00d286f89eb196cd2c535b8bc3784e2f19112
SHA256ffd6b855f81499722f21aa288dfb2949ca49e07e70271fb24d37d2db02213367
SHA5129a80fb565243c865e1f66104e14de98ccf97f86ddc808b928e8f6cd17b516e06acb563b2d3271797732888b8618c1dd0724220a780ddc78cba3034fd6aa3bffb
-
Filesize
7KB
MD52cac6307f0dd894e2de2e6464b9146e5
SHA1e1337b670199b7c8c4e791e2891eb3ed7ee8673b
SHA256a2ae767cf2fe5d7e1f53adcf2900fc226a29eb35f88eacc1a01bd5875886e4b0
SHA512ed9b7b387c0aea6d406c69ec6f7fd806948ffbe4386caf39274d4e13a18219bc5a6b2cf03c4ce8ad2eb2efbf80f22bbfca545bfaae6e0980859a43cd6a4a3135
-
Filesize
8KB
MD5065f3b063032e11651fc1ee195989f80
SHA1653b0e387277db375f19e21a9fed72d0f0d4bc68
SHA2563ab7f6c48cbbcc62f207e6572d8aede116f9b17325724e435be3c7638ae9ba0b
SHA51239a3a357c04961cf1ef320d38ce3cbbd77afe6840dbc7dbaa78ef7d19f3dfe7bc44eb00b41b97e70d62ec9ab1b0f655900102fdd30337eb06e9f39047d50286c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51ef8c26448b13c7cd33062c0581f0665
SHA184eadd6852ad585410625c69537ab60e26daf0db
SHA256717df023c97bd18d66e5a8a72ee0887b8f1277a9f17413fff93378c3650cfee5
SHA512e286c8a0cfb680b6b3ae6d8814730a3bb22d043cab37b72a8be427bdf51c0955c64f468b7729b61378e9ff4624224378505c4c1e8b1e83350fed2e1d0868b074
-
Filesize
11KB
MD5f830c01cec8b601ee7aa28df30aa63a6
SHA1e28d2c14107873a69288fb42d88e2ee8a97a72fa
SHA256046fcadc62314f69d2b6bada5dd0b6872654dca4fc7b3ecd2d81dcc79b090668
SHA51240770f4baf22cc1585e19709e36818ad0da81f418eb7f4f56d0e0ab984371e042502c9b87ca1aaf43846ae877bacdfc6314bb56152ffc0313a51fe96064aed5c
-
Filesize
8.0MB
MD5e0b61b4c34c0295f7ade3d818f60d20a
SHA18c3d55e83dc33563269dcdf09752c4763cb10da6
SHA2564e02c455139e0441f299583935cb7188b0611a85c7c41125e43a29b8936e2b54
SHA512005f6f69395162356b04b0c48380ccdab717220886443f88ad16bc7a869a4e5399ffda176b11349cd235b780f73e779cd120721d3e2a45356de1b784d69df4e8
-
Filesize
18.1MB
MD5a6e1aac342eef3b364cf7149eff03c54
SHA13b2e86fedc7ec2f2529d3f951eb48e55dc0a3d3d
SHA2569f05335475d2ec4059bb1229b5610e78655906994db800492354423994d20aa2
SHA5125e65402257f6cb9bcd73206e66c26236215ddaca6a276f8891e81083d5fc4e66d76cc89f36a414e4730510cdf16566746d3aff0f85e9f1615ef7cb538c3c0db0
-
Filesize
252KB
MD57df5e87056a4001b690c889cf194531b
SHA1d4506dd1fa781ac343f93a8710d38c86a3e863eb
SHA256bc599f97740d6221f36c64234c5b476cbca8ad2a0117f101e9ca9ae74bf41c47
SHA5126481579e5d8a413c58e1689e5bff55c3af2fbb69eade00b23026b6723178eb8421cac29fc939851a060e1bbb0d815c61281a4b9fb0acfb0ee8b354827e86fd6d