Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-10-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe
Resource
win11-20241007-en
General
-
Target
54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe
-
Size
1.1MB
-
MD5
db2082d65265145d992f05920fcaf442
-
SHA1
84edb3496b2bb8db9fab5dbfaa388724aa3b2214
-
SHA256
54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500
-
SHA512
55b05af2666a47d7728e90c0bacdeef50d1401ef423d63ecf20c0400a6a82f86004f1af166857684a097e0c960a9ba1d18ef86144ed8d2bdf98b477bfcc08ebf
-
SSDEEP
24576:pAT8QE+kiVNpJc7YMQGOna45spYKQMtQY/IYHiQqA245zVYjqGSQy:pAI+XNpJc7YMVItmftJ/UQ12qG5SQy
Malware Config
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
5
176.113.115.146:9582
-
auth_value
d38b30c1ccd6c1e5088d9e5bd9e51b0f
Extracted
vidar
53.8
1521
http://62.204.41.126:80
-
profile_id
1521
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://193.56.146.177
-
user_agent
mozzzzzzzzzzz
Extracted
raccoon
76426c3f362f5a47a469f0e9d8bc3eef
http://45.95.11.158/
-
user_agent
mozzzzzzzzzzz
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x001900000002aac1-79.dat family_redline behavioral1/files/0x001900000002aac3-113.dat family_redline behavioral1/memory/2988-119-0x0000000000640000-0x0000000000660000-memory.dmp family_redline behavioral1/memory/4104-144-0x00000000003E0000-0x0000000000424000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 3416 F0geI.exe 4884 kukurzka9000.exe 2988 namdoitntn.exe 2136 real.exe 4104 safert44.exe 4216 captain09876.exe 868 USA1.exe 5600 SETUP_~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" captain09876.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 1 iplogger.org 2 iplogger.org 5 iplogger.org 6 iplogger.org -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\captain09876.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\USA1.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3700 3416 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language USA1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUP_~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F0geI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kukurzka9000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language namdoitntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language safert44.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 4984 msedge.exe 4984 msedge.exe 3532 msedge.exe 3532 msedge.exe 1552 msedge.exe 1552 msedge.exe 876 msedge.exe 876 msedge.exe 4884 msedge.exe 4884 msedge.exe 5852 identity_helper.exe 5852 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5600 SETUP_~1.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4984 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 80 PID 4092 wrote to memory of 4984 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 80 PID 4984 wrote to memory of 3440 4984 msedge.exe 81 PID 4984 wrote to memory of 3440 4984 msedge.exe 81 PID 4092 wrote to memory of 3564 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 82 PID 4092 wrote to memory of 3564 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 82 PID 3564 wrote to memory of 1020 3564 msedge.exe 83 PID 3564 wrote to memory of 1020 3564 msedge.exe 83 PID 4092 wrote to memory of 584 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 84 PID 4092 wrote to memory of 584 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 84 PID 584 wrote to memory of 5016 584 msedge.exe 85 PID 584 wrote to memory of 5016 584 msedge.exe 85 PID 4092 wrote to memory of 1136 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 86 PID 4092 wrote to memory of 1136 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 86 PID 1136 wrote to memory of 228 1136 msedge.exe 87 PID 1136 wrote to memory of 228 1136 msedge.exe 87 PID 4092 wrote to memory of 3844 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 88 PID 4092 wrote to memory of 3844 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 88 PID 3844 wrote to memory of 3056 3844 msedge.exe 89 PID 3844 wrote to memory of 3056 3844 msedge.exe 89 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 2056 4984 msedge.exe 90 PID 4984 wrote to memory of 3396 4984 msedge.exe 91 PID 4984 wrote to memory of 3396 4984 msedge.exe 91 PID 4092 wrote to memory of 3416 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 92 PID 4092 wrote to memory of 3416 4092 54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe"C:\Users\Admin\AppData\Local\Temp\54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RyjC42⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd83⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:23⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:13⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:13⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3284 /prefetch:83⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:13⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:13⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:13⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6500 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6780 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:13⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:13⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:13⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:13⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5532 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A4aK42⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd83⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1384,13462553433572456658,545380209235140238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RLtX42⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd83⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,17935532651582545493,11717648073671383802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX42⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd83⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,10470482303104418719,15793906747141680923,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1832 /prefetch:23⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,10470482303104418719,15793906747141680923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1nXvZ42⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd83⤵PID:3056
-
-
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 7923⤵
- Program crash
PID:3700
-
-
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Program Files (x86)\Company\NewProduct\captain09876.exe"C:\Program Files (x86)\Company\NewProduct\captain09876.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
-
C:\Program Files (x86)\Company\NewProduct\USA1.exe"C:\Program Files (x86)\Company\NewProduct\USA1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3416 -ip 34161⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
Filesize
274KB
MD5e4ece4bbfe7280b28a11a1f37998562f
SHA11b23966e6995cfb455691894dadf8fd9c59503ab
SHA256e43a306cd03ecb7463d9b7f24ed7a2190402c25848297b75f2490bde970b2ef2
SHA51265129084f3f90bda87fd44250e93270292a24af04bf47a4c6cc7f0a5663afa1b51d6a05d37c982636bf89de8dba1bdb5f67292616128e8d92a62b79ceb8c86ea
-
Filesize
704KB
MD5ce94ce7de8279ecf9519b12f124543c3
SHA1be2563e381439ed33869a052391eec1ddd40faa0
SHA256f88d6fc5fd36ef3a9c54cf7101728a39a2a2694a0a64f6af1e1befacfbc03f20
SHA5129697cfc31b3344a2929b02ecdf9235756f4641dbb0910e9f6099382916447e2d06e41c153fad50890823f068ae412fb9a55fd274b3b9c7929f2ca972112cc5b7
-
Filesize
764KB
MD58044b9ea12d49d849f8b516ac3d8173b
SHA168a078e750dad5befd1212a62c903379c1e3525c
SHA25622850fcde13fdc68136d790dee2f85d48069a029a618ceddfd4c6f90b9845d81
SHA51244df6449741275a07f7a3eeb718a1cff7ab6004a5b7501f28fe4269f8601b6ad2a3e6a7beeff0b41e3f2bdf24b6906d49e04b150ae75a33f9537665e4f39eb28
-
Filesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
Filesize
275KB
MD5a2414bb5522d3844b6c9a84537d7ce43
SHA156c91fc4fe09ce07320c03f186f3d5d293a6089d
SHA25631f4715777f3be6a4a7b34baf25ebfc7af32dd9a2aae826fc73dca6c44fda173
SHA512408ebb002b3bdb77dc243ced28d852801e68e5ff0dbfa450d3e91b89311fe6a3e8473e749619c285c1a5427d8a117350a3798435ed38b56d1a230f0ae270ec60
-
Filesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
180B
MD54bc8a3540a546cfe044e0ed1a0a22a95
SHA15387f78f1816dee5393bfca1fffe49cede5f59c1
SHA256f90fcadf34fbec9cabd9bcfdea0a63a1938aef5ea4c1f7b313e77f5d3f5bbdca
SHA512e75437d833a3073132beed8280d30e4bb99b32e94d8671528aec53f39231c30476afb9067791e4eb9f1258611c167bfe98b09986d1877ca3ed96ea37b8bceecf
-
Filesize
6KB
MD5098c82e6786c3398565ea9c996f2b409
SHA11c7ba6e1e09d342612d8e11a1964b4020507a106
SHA2567be9911765e1d248ec6d61bd3c24bf087c374ddd6b18200e55ca2b65953eb89c
SHA512a81d0cece34b35c3d4b6307e06307f7ab770d449d717504d737b7c9bb0df36916512352fd5769fcf6c96adc341b004bec2e25d9c04fe93e18b56a1982ac6658e
-
Filesize
5KB
MD543b473bb1588ffd6674c03ec778e21ee
SHA1c8d45df0377a9749c881c8cefea75f34771048ca
SHA256b2d77dfcac904a64bfab2e46d076e6428a10d21040012ef8695536a82c7bfff6
SHA5123635a07014a3f1b830b02d66c0f18bb150b3f533dc3a315cd711e748a69f187308c162a28af3267a4011e424f5410e120bc6e4627698c35c1615382514f0a0af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5b8c580c08e58d47c04a51f318df56b5d
SHA1344da2a737a1ba7f3c5e8cb559f94629e9cfe953
SHA256a7b4c61fb7b37795dfd7c78a7b7cb29ed6284ad9f84565f9634cc07afe87f8bb
SHA512bdf40ee45adf6212f5d31af593f76fae7279dbe149633f4d0411008c10eb724b548dc2530b3d322f932ba3c5a87e35f4e90c64f06381c584b2368fec5d2c84ab
-
Filesize
8KB
MD5b9520afc4444e3400700d82cf7d970ef
SHA11d32bef8b9b5cca73ccb19c447a589025e025cff
SHA25609a37f72e9830cca5c2b0144a5c507beba87a61839fc0e4be5b7f7717483ea6b
SHA5125014ee16d000ee1e4e5b275a4c4ba428b45215d3a11227e03f9ca291c072db5bfde0ce9f0c4164e0dfc3c3d35e83762d64f4c0901f36c91b72ce30042ac5d933
-
Filesize
10KB
MD51353ab26c15b501ae84d331b914ad5b7
SHA15a6806f9e5bf2bbef2108815ce55fc6b5c569f89
SHA25605c30c2d4294ab3a6390b6f83aa651d0ba0965c53d43706e53e08da6f56739f5
SHA5123eb2d6c62904c4d0162fac6354e793c9fe75614d731d6c5773dd973c1044fb467563981f1451272fe0deb20e9306cd9de0af09ab2a533141c4e090938568725f
-
Filesize
8KB
MD50c7db5afb6a1830a2c9d479a8b403d10
SHA1b0a1e27180e4fc73b04cf57813ce6462bdb1b8d3
SHA2564b106dcff7bf5b92d7d107a00eeb8623a7506c7494e0d8d069cc4e5c0804b659
SHA512d22ef29bb8109a91c2f2ab08cb0d90013ab64e5caede82ee32b1aed1cf2a6207301763a66f13386c7dc7ece1480dfde103ef02bc350673155343f6ffa357adfb
-
Filesize
11KB
MD521ec7725418f2f3d156392cfc62c85e1
SHA1abc5f7bec58ae701fa9df01816486baf40dead20
SHA25626ddd7f9381173c42b545382160bcccfa961d9bdf068acbd37c66cb2b260471a
SHA512691e2c8620f0168f3750ed7a1a060e14fba26b582d5a1cd6f02bb2f4c9ac00b8f422ef5fe09689de58de2b5c6bc911dc38333ddbbae1e34ace64184b0364c864