Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 08:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.ammyy.com/AA_v3.php?v=391500530
Resource
win10v2004-20241007-en
General
-
Target
https://www.ammyy.com/AA_v3.php?v=391500530
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral1/files/0x000200000001e776-54.dat family_ammyyadmin -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 130 6092 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AA_v3.exe -
Executes dropped EXE 3 IoCs
pid Process 5732 AA_v3.exe 5872 AA_v3.exe 5900 AA_v3.exe -
Loads dropped DLL 1 IoCs
pid Process 6092 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 AA_v3.exe File opened for modification \??\PhysicalDrive0 AA_v3.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A82946818BB0433A7DC1AFD2189B16AF AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A82946818BB0433A7DC1AFD2189B16AF AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE AA_v3.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AA_v3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AA_v3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AA_v3.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 17ede0332f52834c0677fdf497e6c7a1cee2d200703d38b2c183e753fc51bc495dad9fa96ea4e6bf806e373b47083ff91234255938d57e6ae4c0c7653a5b976551e2f8491a8085d4eb12e4 AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AA_v3.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 479846.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 1732 msedge.exe 1732 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 5612 msedge.exe 5612 msedge.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 5556 msedge.exe 5556 msedge.exe 5556 msedge.exe 5556 msedge.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe 6092 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 6092 rundll32.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 5900 AA_v3.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 5900 AA_v3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2204 1732 msedge.exe 84 PID 1732 wrote to memory of 2204 1732 msedge.exe 84 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 2200 1732 msedge.exe 86 PID 1732 wrote to memory of 5040 1732 msedge.exe 87 PID 1732 wrote to memory of 5040 1732 msedge.exe 87 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88 PID 1732 wrote to memory of 3744 1732 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.ammyy.com/AA_v3.php?v=3915005301⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb517b46f8,0x7ffb517b4708,0x7ffb517b47182⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
C:\Users\Admin\Downloads\AA_v3.exe"C:\Users\Admin\Downloads\AA_v3.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1676 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8791028319087106691,11443313406737140680,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Users\Admin\Downloads\AA_v3.exe"C:\Users\Admin\Downloads\AA_v3.exe" -service -lunch1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5872 -
C:\Users\Admin\Downloads\AA_v3.exe"C:\Users\Admin\Downloads\AA_v3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5900 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD5480a66902e6e7cdafaa6711e8697ff8c
SHA16ac730962e7c1dba9e2ecc5733a506544f3c8d11
SHA2567eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5
SHA5127d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5
-
Filesize
4KB
MD561cf41c7ddeeea4368e97fb6fb0fd2d5
SHA1aa9eb96c3f3f6f67ce7ef6997ae83a6faca1498a
SHA256e3c16d9d510e17237bc7c4deb1c189f9404dbea5fd45c2defb385c91f1e3b855
SHA51233f460e62ca7de94fca8d97bfc9f4eb61c2005fbfb8ee5285972af8959ef084f2428af8beba106bda2d3e73e0b6448e5a37836fed6cbd7d6953558465ca4af28
-
Filesize
46B
MD576038623e270f399769df67a3ed15c16
SHA1ebf7d7537f45738be48e6f64d59c846b13fb4334
SHA2564dbdf4f709d50f9521e92ce5f7d4f305e2384bcda387fb2b325ff17d205bb687
SHA512a5316694d844e5b10c589f58fdf65645568b3909b2914f85c99195f9625e4124f787bc0980cff98f1e8289ff84824620a03f32cdab18e5bbcb2e59b33f397aec
-
Filesize
334B
MD5e5bb81365567b76c819f2e4e3c270662
SHA1e833be510f9c9b9842b80212b393d97405aa01a9
SHA2568bf3acb0fb958d31bfa956a6e82e9aed7f6f9d7d6c2e02761a4ef938e7370342
SHA51204b0f08e59f92b286a7a5475dce51e92683f8421077389cf1aa396fdc9c1d02a42002227faed16bb61d4d7f018297275edbf2498216b3f756c78ca05daab2b62
-
Filesize
11KB
MD58d2e3fdea9c6e08bb91ff5246fb80f55
SHA1a0476bb4b24299c5fa73e26d1f97ec6f29b96d72
SHA256959a665e7092d8c4d8b169d48c2173ec225e2b466f33847469e4db4495c6002c
SHA5121a278947b65dbb8f3ac1ee0296ccbadb671977c725b0ca17b5989f828ee27e16f2dbdd241b9de8ba87bdc5a0993fe01c802046cfaec1f40b3fba7ca0d6c843ea
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD577fb7530eb9772d8ad116387636a32ce
SHA1291f1c96c1613759b8dacd9679b70d3b3ecf0458
SHA256f6571d4a89fe8382e5a09d5ae3d4e65596c47859c919f56fa9a0912d6573589d
SHA5129028b58993b83ab871018376b7c5cdda14f58624bb0d88cf10b7ddc35be8df73b50c949d9c4a101862a06fa08bfc51439d84d6df8952406572b5d1ae9f1aef17
-
Filesize
402B
MD569ee464452495d93d18f4b8e67f63d4e
SHA1924d784a273ecf449f7217978d3774967d39bbd8
SHA2569614cc7799adf4df4ba6957d7792a76709fbcda60b748a7894f8ecd14d683945
SHA512679f90af2ba2791bf35d4a755470080f1ecbebae489d6ac42bbef217ef33d80fb7a9f301957d57d0c03d05996ce2b92752079c88d68fb63843b61e53bd0d95cb
-
Filesize
5KB
MD5d546f1dc5a883d949ec7528676e1ea91
SHA172e98d8ba74f3a2ad650f3272a01937be457cd33
SHA2563efb6a1c1942c326841b10758790e6440058ab297f24a11be48bcd9065729ccb
SHA512f450dc58fb1346140984799f8bb967f0b0d49828ce2f625850a9e73003ba37b417f923c3547f3de6e26f2b487d42bb6854590d66de78cd64a000e24495376853
-
Filesize
6KB
MD52ae43e176deb0140f237aa1ada294b27
SHA1c9a11d8c3a865b1eadbf3deb94571c8475f8f76a
SHA256052786b5b217d2c0ff6d692d19c25c6d8d2004c29aa68909db7cf1347fdcfd9d
SHA5127115e91adc9210602686a34409700aedc902ef8622ad603869b5ea947476147f2ccd1cd91b46013da58cbcaf40444e252688ba77ac1956b6b5d2fbe5cbb94933
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fc6ae9c7fb4f1397e1f6d526081c2057
SHA1518d2c5bcb43b5268b9e02ea2586472555566191
SHA256f29f6c08556d2393bf267ea22882cf593e9d95f542525e265acc42aa5e96fc8c
SHA51267edae14a2b98c28f382992dd82d26f1c7f132a60a594f889464e4908459ead1de97714b705e309768d0c94a4c227f99de91e6da5e072acf1c2b755cd9833a56
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be