Analysis
-
max time kernel
86s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
counter-strike-2-hacks.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
counter-strike-2-hacks.html
Resource
win10v2004-20241007-en
General
-
Target
counter-strike-2-hacks.html
-
Size
7KB
-
MD5
135ba29c278e677fec446ac16eae20f4
-
SHA1
37d4f3d0ae23139cee0fad123fe02de516031eee
-
SHA256
ffd902ff33b4c5ab5c2365320ba4b436f8fb7b2dbe039d5ffc0af7da409a8f63
-
SHA512
e84e3a37ef99239bd2ec14a5bd08f38dfef5d1892b1458d35f81e5150b6fa0479d2a57b0d435c68e4ec8b289460bb33ced69111cbed1fa132204e70b9c4d7042
-
SSDEEP
192:PN2x2B6wLl8mYajrVy49cNqetNiw6IhkhMmOjy8N:AxvKl8za9y49cseqNK/3N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
undetek-v7.5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language undetek-v7.5.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 9 IoCs
Processes:
msedge.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{B7DED891-9EF4-4A6F-BC5B-4B30A7DAAF66} msedge.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exeundetek-v7.5.exepid process 948 msedge.exe 948 msedge.exe 3480 msedge.exe 3480 msedge.exe 1876 identity_helper.exe 1876 identity_helper.exe 1476 msedge.exe 5088 msedge.exe 5088 msedge.exe 5972 msedge.exe 5972 msedge.exe 5512 undetek-v7.5.exe 5512 undetek-v7.5.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 4284 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4284 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3480 wrote to memory of 1956 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1956 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1180 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 948 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 948 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3780 3480 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\counter-strike-2-hacks.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1d5946f8,0x7ffc1d594708,0x7ffc1d5947182⤵PID:1956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2420 /prefetch:22⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2768 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:552
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:488
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:2808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:5044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3416 /prefetch:82⤵PID:1284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=2060 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:4332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:5952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:5960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2184,12116322240796680349,11865501789872708894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3fc 0x4241⤵
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5224
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_undetek-v7.5.zip\undetek-v7.5\Install Guide.txt1⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\Temp1_undetek-v7.5.zip\undetek-v7.5\undetek-v7.5.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_undetek-v7.5.zip\undetek-v7.5\undetek-v7.5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
16KB
MD503b1cfaa7d36337d472a96c4375e612d
SHA111dc55047e35bf5de4cd9355d63dfb260134fc8c
SHA256ee0a54330955c4516f7f57f9cd56eee28900863f7de6598458bd88866b7e40ca
SHA5127d7750b8622f0a6c3c9cabc582956602c531ff8568f18ea088d267454cf25a0dbbb1f5a43215fec995e9aeaa379976fe044d3ea3234db56a7ab4a5444273a437
-
Filesize
29KB
MD5307cc9c90b07960982452fd122fa89ca
SHA1d3f42e1a37b7a5e959c39a58d2a0a0e052b49961
SHA256c6d11eb819da4a0881a7a97e06c203056dad988b7e2b7408c937956a1e454718
SHA512ab10518151cbda16a00281e1788421e3755c252feec398ed68311cb7d72d9d2b7cb199b542d108c396212d01d194aba61de8626e4f8208421ab5dd9926ef8b8f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5e65d2dd4091204f563671be1a19cce79
SHA1bfebb685dcf5107210c38236256e9d95488ff844
SHA2568c6956c3e08d0c78f35e67436a552617e063a7cbf85d34e04fbb45a2e7b6f472
SHA51215137661345c15335afe06e91c9be7810d260c20dc7692512b96d5ff69230b72242d27e262ba90a68d365c526da749dbde11392d5a0b728cc92802eedbdfd375
-
Filesize
6KB
MD52a8e7a6cb38eebc9fbd7850c901ef422
SHA119c2dfdcd02d5b8ba1a7f2c76d2e21a6e3912149
SHA256c7ec8cef61d65e77378911fa003ddb7f8f380163a3ac1742f8950908d59ddeef
SHA5129f316882958012688ca1fc893ce7050b898948dd5cfaaab03ed2a2e9743cebbfe18f3223e6ec943b2d5baa1eb2ddaff683af3045b4b16d0a234527151c4314a3
-
Filesize
6KB
MD591069e65552d998d18acfbe3a30c85e2
SHA122421e1a16dd4d6febf33b57eb12f211df43440c
SHA2565d4cab6c8b25df9eba2a01d9d4e234123dc2b81322cd6696b06ef5c821276b20
SHA5127e64590570e886fcaa202d6cfff74e12ea2bad2d4e5b98ccd6635dcbb81094082ad4206966219cd852a5167da44eb9b3d261b9bbe7978f9acef50d46b5c0c7ae
-
Filesize
6KB
MD5f3ced5a715e69aaffe187d0ee26c9f4b
SHA123d1a4b904e8765b396301f4f57d593ab4dd6b34
SHA256250777126448dad086038066434c3038e2eae594a973022e770039d1d6503dce
SHA512f5dd4f1337e4924478d266f30eb9ecca7069dd99ae21d4595ab7c7ccc0d2ccfefb29903c02df5bc4220b759ac9075517599ccaf1c8ccb5266b778f2cc3a55632
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bfdf910d-1cd2-4605-b0f8-0295182feb3d.tmp
Filesize5KB
MD553aa21bd8821c32451bec08a67eb30b1
SHA1a1b3c8e4aad14cd64d3662eb4842acdf11c5e1d2
SHA256d760823a713e173c16f10c225a5ee18bacb43f51c3abc66ceb97234c2df79414
SHA5127d0d157d67b1b50457e26b98995ac4ba96406ccd71cf6d532ad784b69bcb130f0dae07cc2a14ec032eb93174890a0411de7a109ff2261d2369f3f4a0c8071c5e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
12KB
MD5a7cba42beaf8d94b2eea907a3af4059f
SHA1573e0a819cb163e8230e618d639f8b0c71bdfa72
SHA2562d071858eb4c2407292dbae6219657995ccdc8d7ec7c6fd976ba96adf73f01a4
SHA512f9cec0d50ac0267b49119bc4b5f86c375fbac1eddf147f9cd11d27d608c953b6209b18995ef94eae87561599302df8974c71dbb80eaee59b531e0121358cc4cb
-
Filesize
11KB
MD5b1acb37901c94a8f12f111c7a7d3cf01
SHA16b5341a25d0aaaf965e65f81aa464a2370329846
SHA256f53a2380b448a20054778d8ca58673c5e326105181c7b4c15ec2a3099950f6e8
SHA512101000ef04131103155d7d847c03f1d5c7201da556a334c0f50e8dbca6ac37a5257d163243d2f87a05061a2b21ac622acea6b57ad13ad61f2eee1be3e33a8351
-
Filesize
11KB
MD5fb171e0fabe6b686311d7e534a6775cb
SHA1be193ea8fd375e2b7d44ea19942921dfa2c56ac6
SHA25633ad3a3205349f1f59c4867f034bf6e2c2728cbbb6eec7634128e7b82512e5cf
SHA51253030a402cad60b4a3d365f47b34b6097d07eba189f2d2b867b484584e5df2db7bc8d0600a25f11c4dfe2aca73dd024c7933e1fbec72e6650db88bd1e9947294
-
Filesize
29KB
MD58def5e2fd03961dd14b0a89d1b6f2a61
SHA18611936ba749041a202dd88bc6ce722e55f2ef9f
SHA256d5c89a4b9ad6b0fcbd9692a2b444878630a23a1dabac11a28ee2445a3093280b
SHA512ef33163bf2081153811d2d433050b8bc882b8647743c15336aa0529e40323b2a175f77e7b4a5799f558206e82b044cc3989afe19d9410a1f526829c94e595a72
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e