Resubmissions
19/11/2024, 15:24
241119-stjl6sxmcz 319/11/2024, 15:24
241119-ss86fasnam 311/11/2024, 02:01
241111-cfjr1szdrm 711/11/2024, 01:55
241111-cca1pszdlp 7Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows11-21h2_x64 -
resource
win11-20241007-es -
resource tags
arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
11/11/2024, 01:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/search?q=animeflv
Resource
win11-20241007-es
General
-
Target
https://www.google.com/search?q=animeflv
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1537126222-899333903-2037027349-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\4045_7_BD6w.mp4:Zone.Identifier msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4592 vlc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 3900 msedge.exe 3900 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 4360 msedge.exe 4360 msedge.exe 5744 msedge.exe 5744 msedge.exe 5744 msedge.exe 5744 msedge.exe 5504 msedge.exe 5504 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4592 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 6056 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6056 AUDIODG.EXE Token: 33 4592 vlc.exe Token: SeIncBasePriorityPrivilege 4592 vlc.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4076 MiniSearchHost.exe 5900 osk.exe 5900 osk.exe 5900 osk.exe 5900 osk.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 4592 vlc.exe 5900 osk.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 5900 osk.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 5900 osk.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 5900 osk.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe 4592 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 4356 3900 msedge.exe 79 PID 3900 wrote to memory of 4356 3900 msedge.exe 79 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 3992 3900 msedge.exe 80 PID 3900 wrote to memory of 4940 3900 msedge.exe 81 PID 3900 wrote to memory of 4940 3900 msedge.exe 81 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82 PID 3900 wrote to memory of 2076 3900 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.google.com/search?q=animeflv1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdcf4d3cb8,0x7ffdcf4d3cc8,0x7ffdcf4d3cd82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=collections --mojo-platform-channel-handle=3312 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=7036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6860 /prefetch:12⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6768 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=audio --mojo-platform-channel-handle=3120 /prefetch:82⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7300 /prefetch:12⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,14085363949562950488,11022746753507874205,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:5504
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\4045_7_BD6w.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:240
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4076
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2472
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5360
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:5396
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5900
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004F01⤵
- Suspicious use of AdjustPrivilegeToken
PID:6056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54c1a24fa898d2a98b540b20272c8e47b
SHA13218bff9ce95b52842fa1b8bd00be073177141ef
SHA256bbcc378fcbf64580e7a48b4e7ca9be57fa0a1f2e747f488325685bdb18d73a95
SHA512e61f196e7f1c9a5fe249abe9b11eea770fb2f4babc61f60b12c71f43e6fe9354cf14869daf46abc2c2655bce180252acd43c10562a2dcd31fa7d90d33253820e
-
Filesize
152B
MD5f1d2c7fd2ca29bb77a5da2d1847fbb92
SHA1840de2cf36c22ba10ac96f90890b6a12a56526c6
SHA25658d0f80310f4a84f687c5ce0adaa982eb42fe4480510399fa2ae975d40bb8bc5
SHA512ede1fafea2404f16948fe0b5ea5161ccee3ee6e40c55ff98c337eac981a6776b9c73dc030a5c59e4347aec91259f497539206e71949c33adcecbf2c846709e14
-
Filesize
216KB
MD58cbc1ee690a52c480e710597d661acf2
SHA1f2ce7893ba9f154625882dd945dd246a45895eaa
SHA256bfe91cbda3eb74e31bffe705cfb28a9f00216152269cae42463009c2c5ec82b2
SHA5126f75ede2c4cd811c436e554574d392e1af2041bec1a5d36e248d29d3b7af6af1c8ecf9dd9f7fb000d8c6a4727884ed4e50e376643ed75e6dd4afb211c0fc5086
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD511ddbd4652e603a58d03123858ce312f
SHA1f3f0815aa6d967b349783e72e80ee8d72f329932
SHA2569b3bd45e2ed3db56bd508d17a359856ece9ed537be9e405ba0ffb40e912468de
SHA51246bd4b40bab3b8bd5cd2d7ce425e94a017e7ccb69a6c8228eea05b258c8e3d2f3f679cdccef67fea65a9c4f93fd98178e72c0fbb1e8cafabfb6590de6653bc2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD5b8f3888f7e5d45c8c05b28728ac95b43
SHA1a3fdf5ffc0baebbf0fbc5b7ed78c78fbae2c2aa8
SHA256c801f21e472ed8a9905420c71a3d0459c0f4ff9c280faa188be080fbde4b3c72
SHA512750cb62f8412f0c68353931f0078f2273a92ba65434c090bc12918744b7cb65af5547acd1226589087fff053ce7c0a6a290d58f5a3883be221d3c84cb50fd85b
-
Filesize
4.5MB
MD5801d5f284a2a562368dfdd647da8be8c
SHA1f2654005156587edb72a9c883a0d4fd9229a6788
SHA25686535712b2f329fc1f77e6a494ef100e1d43d229ad12a0c1318fd90c453bc450
SHA512770aa9709a0b54482bdedb74069c0007ff0db6d037fe66ebbd46b5d421f4a2de1fc1278089c8dabbf995624287f637e8eb7326836a61d97469a57951996f4065
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD5dd6f3bb0fa251f0cfdf707f3a0804396
SHA10dbcd79c3db9d807df4398bec69182c120e75a17
SHA2568c7e409d37f2abb24a8082c360461117e0482e1253fdda8db0f2fd5e3ba5c038
SHA5128e9f49bc68d797cdaf2449d619a3e204dc8398c9740b9d7fba57ffa3403cab9e1c78288be0ab0507d9c06bf3ae6400915bf0016bdcdf48d5991a08c1679a0d99
-
Filesize
2KB
MD59f8df468f1a1b0397488fc74da0f39ad
SHA10bcf006e31039ca570764558d4d3f55d80915a5b
SHA2564f600312a18ee99fd62cdf03064b08b097818eb771eecb87abc9fff33026d4d0
SHA512feb120af72ca0616eb8abbe1064e561fe906a7bfa3c0d0c4ec7046f64339232e88326a9b8c0e358185520c1bdf96c04f99a77251fd75e795992a91b77a113735
-
Filesize
7KB
MD57a15039af62f362e80a526b433610d30
SHA1f6f1041159b4dd3b4bbca95262ddc4ec1b52f118
SHA25628cd0ee4e97cdebe06164c5226849e582a79280ce236df6522d15d7f25912302
SHA51288c5a1d18c74834fa994bd2e4d050e5b3ee3d8c21ca4061c7ea5f97084bcc5cf2c0014f131dd8f566bdf07934fac7af824ae48a76ea62a8e36e3bcce14c757eb
-
Filesize
7KB
MD59ec6cbd9f5709e90b1f312f5b5257184
SHA1da2bdf98348558d57f20248bd03706437aeca54e
SHA25600f98b1addc628ba20ee9f32e928d986271ba962f4757f07efe507574956e7f7
SHA512d1d95e6500de8ab510154e93e13f3d825c988c0c9f7d937b0cbe0fd91906f0cab3e905170810497681923a4f92f45dc3bde17eb9bb89cbf03ba098d661ffcf27
-
Filesize
5KB
MD5a19eb94007d98dbfd72f49021ad329e7
SHA18c47201a9e68fb132865449ee2dc15ad007f199d
SHA256e07c8426dba7b775e72751355d6af3493e2fa79c7501d8a1fd3d41a982f1b2ba
SHA5129a601bc6473da3bc941cfec38e686e5cb141f1dfd85cd2ead37fcf96c0b59ddb36538a49cc71bde2f0a758c6abbf4a27cd354d069b9ade1d42ab4050561e29d5
-
Filesize
6KB
MD5c6ac3b20f5eb163626d4904fe067c844
SHA129b855336acde3966aa8860c3211a1052f538d56
SHA256a51d43c67bdb204f7b1aa904415e62f79098a8c8a053cdb225492486f4370ad7
SHA512e647cb4bc543a37a121850f13c28d245ccfaec08f7c506f0e6b777e3cb343b2a51e5dea48729ce1c5f3949cde5cd5291ac6de1a4ffe44c03fdf1fc642f780333
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5554a8887c8c85859cd01be73cbe25de6
SHA15c0a8bce97f64e4f48917e9e13ed9df79343b087
SHA2567755e53b29ec764d3209184b970d9689b32a8448b7c694dcb8a5679f54952927
SHA512d6b85505dbcab80ee619b27ed4d93a08b2eb8bc476d0461da1fc784d0db512915a04a23f8564872c14974202d8320660871e10b46187ab008f1bb8b5abeca3d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59e0d1.TMP
Filesize48B
MD5ec78b09b73199dac95f856537e273579
SHA1c293af9e0706f3a2e3fb8efcb5133f390f361c86
SHA256e62c1cd95a0f575e4b970f1b30e94eb4d4dd384749ca394678d4435dfa4812f9
SHA51235eaffc53306689f27c95b6e37ff53d3f19dd2d42aec3cb4480081b2eb414e4b6ef070dee049db84c53a3bbbaffae96b12a7722c9daaf0cf8edd182409caf8c0
-
Filesize
2KB
MD569d863ebff75fc1c0fdd03aaf4885bf2
SHA1bd9ba7c2d7305eacebd18a3edb2389af52c2c3d7
SHA256b3bcfe757946c8059c0cc82fc62e761edf11287752ef303567a182c15180759f
SHA5123cc3bfa918438aedb44471888d4c7dcfa901c6db2256f25b1452af8c784de6d615017d2d3b9e81cd781f25096abc446409d6bed0e330d6d4475253debdd7f4b5
-
Filesize
2KB
MD5c36b31a678fbec7651b3a26126ad7b97
SHA17cd29b1c39b1434007ed8b41e9702d1cbf08524b
SHA256614d1008818d06a8aa4ab79a5a2f55f7e215a0ff4e88a27612ad56725781e329
SHA5129f1a7adeffe7713d8078f4d25e3560ae0c98549dbffa4f7ba0862915906ed04088ffb7864687281b44a5c6f86187614b58ef4e1c400dff0cecea8de028886ff8
-
Filesize
873B
MD581a86c7c63e54da1025b6b84a5f0441f
SHA1fce0fe074fd095a9e115e92755dfd74655a061f5
SHA2561fc65cb23eb6403493ab41a2d4de19dab6c7ffe3aafb8775a139b4ed0ae413af
SHA512ea661b76c2d2ab870f871d8b1cfa64e8d4fdbc5b0ea0ba20ce3cdf2f2a8993d12468f167e3d8fac69b5df652b73217c98d3509207e13d9f3201136ec22e0cdaf
-
Filesize
204B
MD5c7118c5704bbdb4dc49a43577dcdba6b
SHA1776667c7bcebe627a0c306553290b0cf428020c9
SHA25684b8bd42c8616df45c1b63ca16166e33d37f48c3012d2aa79b0c1aeab0a043cb
SHA512b929e402eb74fd16de5ab75da7dbdf220946fe60d4e6962324855c17d96cc455095a7ab44194bfbab236e39df98ae760ebf6e1275d46c247ba8e2de63571c437
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b91ccce2-787f-4279-9105-b8f9d6f35fe2.tmp
Filesize6KB
MD59fd49e54f03c933f1357b675bc2769d5
SHA1b9523074c038d2c3f2c80de6085c75a8930b3b8f
SHA2569c353e2317eb5fca62555769b9463be35138f216b1d8980f28b67955856f8a2c
SHA5123661a3abe21f9f191289bacbac519c4948e1f0917d31ed7e9fdc602cfee9fc0c329c990460233fbc60a2d30e7b177ed0b773263bfc56be2ed4875df08f538ec5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54832848702f53e309d38a1e1cb79b7fb
SHA1b9d7532c8ff5693eafd396ec5f0758f665aa0c5f
SHA2569bd4ad58b4555c6f6dfe8e0db69c22d590d3a03fc5c1a6ea0c3a4b672e78e402
SHA51257609933566edeaada9fc4b5fc37607259fc15834373c4c75da1debf2fc8f55c102e89ecef407d666d0f8d02cfa16a9daef1591b8af08b13a5be8d3300a9b73c
-
Filesize
10KB
MD5d1b1a4dce6747bffd8cf5534075140bf
SHA16c49d80276b09c2b81adc62e39db211d95e746c9
SHA2560e3377bd65abd32f8c3644b81997afd75e2fe7a9dbddf5652c02b983705df0a9
SHA512364e742e688da42c9a79d498f9c70ed15cd710aa345022821f84946d0deb5de61c6b5e2637abef8c4851a00c5a5d687b19ad6006de46002ad1e5d868a4010c14
-
Filesize
10KB
MD546340c0d0ee7063367dc0bff1b10ca8e
SHA11c804d2178e890c0ead6b8684c67f56ac00ae9ca
SHA2568e4651ee9769b8627b144a5ce0b2a2c9658907941822a579cea47dbe924e9292
SHA5129ce20862ecbab369b2f5676d079d863cccd07fc4189692485ab1efb34fa0db63994e5d8718ee5d3b6a89e6ab40089f8d60a918db123e0b6987deea43f28a2ce7
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\59d27363-5a7a-41d9-8a5e-8ed8f80e626c.down_data
Filesize126KB
MD50a110bd321f114ff8727674eee2a490f
SHA1ed3eed0bc086ef1df640064d483e20487182a215
SHA256f1f611b30db0431160b742fb7b8a5ae609a7acbd3724810d92e186c65c14c268
SHA5123c08d7c95e5bb0fbdf87cce4fbf7cb10db1f2d5df8cc3e8c214ae064d1e0a0bbcdb1d599605a04dd0ab8c0c3fe5401e5a75ee8620d219e4e0da0810693bef728
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98