Analysis
-
max time kernel
106s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
malicious.zip
Resource
win10v2004-20241007-en
General
-
Target
malicious.zip
-
Size
1.8MB
-
MD5
6e21499d32f36f93fa176f38fb4b9b77
-
SHA1
63136b30330cf86527a87f986c5eb5dffaba66f6
-
SHA256
4f39c7599a824ba6f9698eb2ccf780ee4aa30a427ea3b8acc4254916068e07d4
-
SHA512
5d665ce32e9fedc302c0487fc49c5f808f47e6fae7628926498931e50d98d03ff3d0ee5fb8cf0fa7c0c3a2b54e2f18d19a376ad9284b06433b9154b9d09dbe0c
-
SSDEEP
49152:R5BZHSCcUzdE+vpwuSXg3Hbr0ntqYHqcB:R57RniuSXQ7r0tqYKY
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/60-78-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/60-79-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/60-81-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3868-89-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Executes dropped EXE 9 IoCs
pid Process 5112 malicious.exe 2944 Yt8ge85.exe 496 GY4IC43.exe 2144 hE8Zq97.exe 1752 1Zn59od7.exe 3496 2PO9885.exe 4828 3FD62NB.exe 2064 4Ii975UD.exe 3700 5uR3lF9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" malicious.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yt8ge85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" GY4IC43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hE8Zq97.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1752 set thread context of 3340 1752 1Zn59od7.exe 106 PID 3496 set thread context of 60 3496 2PO9885.exe 112 PID 4828 set thread context of 1300 4828 3FD62NB.exe 117 PID 2064 set thread context of 3868 2064 4Ii975UD.exe 121 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1008 1752 WerFault.exe 105 3416 3496 WerFault.exe 111 3820 4828 WerFault.exe 115 1368 2064 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yt8ge85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GY4IC43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2PO9885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3FD62NB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5uR3lF9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malicious.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hE8Zq97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Zn59od7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Ii975UD.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3340 AppLaunch.exe 3340 AppLaunch.exe 3340 AppLaunch.exe 1444 7zFM.exe 1444 7zFM.exe 2856 msedge.exe 2856 msedge.exe 4456 msedge.exe 4456 msedge.exe 3624 msedge.exe 3624 msedge.exe 5908 identity_helper.exe 5908 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1444 7zFM.exe Token: 35 1444 7zFM.exe Token: SeSecurityPrivilege 1444 7zFM.exe Token: SeDebugPrivilege 3340 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1444 7zFM.exe 1444 7zFM.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1444 wrote to memory of 5112 1444 7zFM.exe 99 PID 1444 wrote to memory of 5112 1444 7zFM.exe 99 PID 1444 wrote to memory of 5112 1444 7zFM.exe 99 PID 5112 wrote to memory of 2944 5112 malicious.exe 102 PID 5112 wrote to memory of 2944 5112 malicious.exe 102 PID 5112 wrote to memory of 2944 5112 malicious.exe 102 PID 2944 wrote to memory of 496 2944 Yt8ge85.exe 103 PID 2944 wrote to memory of 496 2944 Yt8ge85.exe 103 PID 2944 wrote to memory of 496 2944 Yt8ge85.exe 103 PID 496 wrote to memory of 2144 496 GY4IC43.exe 104 PID 496 wrote to memory of 2144 496 GY4IC43.exe 104 PID 496 wrote to memory of 2144 496 GY4IC43.exe 104 PID 2144 wrote to memory of 1752 2144 hE8Zq97.exe 105 PID 2144 wrote to memory of 1752 2144 hE8Zq97.exe 105 PID 2144 wrote to memory of 1752 2144 hE8Zq97.exe 105 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 1752 wrote to memory of 3340 1752 1Zn59od7.exe 106 PID 2144 wrote to memory of 3496 2144 hE8Zq97.exe 111 PID 2144 wrote to memory of 3496 2144 hE8Zq97.exe 111 PID 2144 wrote to memory of 3496 2144 hE8Zq97.exe 111 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 3496 wrote to memory of 60 3496 2PO9885.exe 112 PID 496 wrote to memory of 4828 496 GY4IC43.exe 115 PID 496 wrote to memory of 4828 496 GY4IC43.exe 115 PID 496 wrote to memory of 4828 496 GY4IC43.exe 115 PID 4828 wrote to memory of 2832 4828 3FD62NB.exe 116 PID 4828 wrote to memory of 2832 4828 3FD62NB.exe 116 PID 4828 wrote to memory of 2832 4828 3FD62NB.exe 116 PID 4828 wrote to memory of 1300 4828 3FD62NB.exe 117 PID 4828 wrote to memory of 1300 4828 3FD62NB.exe 117 PID 4828 wrote to memory of 1300 4828 3FD62NB.exe 117 PID 4828 wrote to memory of 1300 4828 3FD62NB.exe 117 PID 4828 wrote to memory of 1300 4828 3FD62NB.exe 117 PID 4828 wrote to memory of 1300 4828 3FD62NB.exe 117 PID 2944 wrote to memory of 2064 2944 Yt8ge85.exe 120 PID 2944 wrote to memory of 2064 2944 Yt8ge85.exe 120 PID 2944 wrote to memory of 2064 2944 Yt8ge85.exe 120 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 2064 wrote to memory of 3868 2064 4Ii975UD.exe 121 PID 5112 wrote to memory of 3700 5112 malicious.exe 124 PID 5112 wrote to memory of 3700 5112 malicious.exe 124 PID 5112 wrote to memory of 3700 5112 malicious.exe 124 PID 3700 wrote to memory of 2456 3700 5uR3lF9.exe 126
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\malicious.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\7zO4A5107C7\malicious.exe"C:\Users\Admin\AppData\Local\Temp\7zO4A5107C7\malicious.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hE8Zq97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hE8Zq97.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zn59od7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zn59od7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 6127⤵
- Program crash
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2PO9885.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2PO9885.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 5727⤵
- Program crash
PID:3416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3FD62NB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3FD62NB.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 5766⤵
- Program crash
PID:3820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 5725⤵
- Program crash
PID:1368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\B575.tmp\B576.tmp\B577.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe"4⤵PID:2456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffd81ad46f8,0x7ffd81ad4708,0x7ffd81ad47186⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:26⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:86⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:16⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:16⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:16⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:16⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:86⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:16⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:16⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:16⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,12187682650187632248,1364791056689208226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:16⤵PID:5216
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:4748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x84,0x170,0x7ffd81ad46f8,0x7ffd81ad4708,0x7ffd81ad47186⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,12943893963642692646,14865898897802438373,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:26⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,12943893963642692646,14865898897802438373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1752 -ip 17521⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3496 -ip 34961⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4828 -ip 48281⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2064 -ip 20641⤵PID:1520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\71f004db-4811-4413-b4dd-e1bd39cdfeaa.tmp
Filesize5KB
MD58d0f619761754a1329346e542276c96e
SHA158f25762109a5abf032e5cbfbd6497143617eab3
SHA256ed6aa8b125869a866a82d417a550d9c853fe8f3b3015db007e5340cca22a2a75
SHA5124fd3facf2b89f25c6b74b377ca395a6818f949e81f3462875cfedf9bcc986b174d5bc9b3b2d1f2cda1eeffa3224c167ef1edaca1234cbe1a5791b7f75543523a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54f06caf785b6a0f3f5d2711699669ce7
SHA1343fd4f41539dd91d742e36d40c80cd707ff56dd
SHA256a61ff8717576112539b1511d459ae07652975ef1a706109dd7495575cbc0ea31
SHA51247bce512d89966b7d50362a5b1797a357e0e61b3dfce51c8ec6deac39dab18cb66435db709f322b7e16a8fd873a8a40bd1d94e18cce1c42f96a13a1bd439b1b0
-
Filesize
1KB
MD5555359e2038aa17ae5b9331a5c4b2b23
SHA12c6448308db5a1741ee7d7b82aa29885ef35faf1
SHA256509bdc69f3aa2bbd65375e5b512f842becc995360eacb89212716e6ff86c5a14
SHA5122173b0e9d53aa7d9765352799186a358d98e4b3d92c0001cb2e6efe6f567bdddcb5701932bdd5ad72ea25aa061da2e1b6eb51a062c48bb105201cb21351025f5
-
Filesize
7KB
MD5f8d3bb8b041b999a95d506555adfdb95
SHA1c6b66064cc40d56439f6e9aa992dcddf2caaddef
SHA2561497ad5c59870ed097368f3259e4d361544fe5d2400d82e7874ec41df682988a
SHA512537a0ae16d539b6056e8311af72e6513366edd2a74aecf8bb0260f4ce37c5b6fa44cab1e6bd34f8302c34f26763ca102745ed3e927f980c5bf7e69a048217da5
-
Filesize
7KB
MD5243725aa4a3a9f87540c159bb5ad8e14
SHA1e283e284cc9ae78f1beda45fa49555a499bae70a
SHA2562fc7472ca667ed9246331f56399059739008ddf879e2b9cd38d9cc5239543116
SHA512b2491570f6d9961262cac26a2a9cb6d406ac530d5af94d8466de22da98805b16ca921403ab529a9ad4199958591831fd98640a33662d856dac35afdbf726f0e4
-
Filesize
872B
MD571e6444b58b15136bb7b24fb13fc8595
SHA116298b65824aa7b88563956f6d48e51ec0bd4bc1
SHA2567912f46e09c837c4fd89cede52121ede110b3506bdb9f9f5f04b261c3371d522
SHA51237a444351074e0ab3642515192f115286581d4a13442c2f1e60f7eec260e80b8cf56382810e59ca3504b74155320aa152999ff2524343d5b733befdc2e0cc55e
-
Filesize
872B
MD5a024419c2dd3fec51a41e7b89f02017c
SHA1c2eea8698268c33fbbb22ad8834712eec4f49d81
SHA25691bbaa6af31f5bbdb6fafb3382aa3460e8b2ce8b34f849ad3c119755a80fe675
SHA512b04ff9424e577e629245604c7ca788ae2c166f958670e70d02f46ac6df6d0cc8886dedcd1a03eb70384b5b6e07e79b97a6b6b323c3ba82595514186abb6f7b66
-
Filesize
872B
MD5e6ce52193e12c0e91c695df21f285fbb
SHA1a3096becacbccd7b9228e668a4509ec102f15b4f
SHA256f594445809b3ecdf65157e562495851a55b148a9b19b4385e26a5d036a4557e1
SHA512eef08ea5a23a432a45e985e574b2375ae7cb437272f0a51bf20a20dd9375bd152a3327388cfdce7eb9f203bd79dc2f2591d65b6795c5b509956df630c05f20c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54d196aae9c77c86afd1a78992619c359
SHA1bc5a08d918161ce5a079218836163984cd171681
SHA256433dad489e0d9ea8facf71002a38e08dfcf2c8807bf7858ba6dc2c7bed998b95
SHA512c58484fafb62e95d5e07c6abeb356891e22acb4a8b6b6743142c8c59d9c80d2d72e6aebdbdc67f3184be9ebfe068fc4553f09fc2495db62a0042071159bbfac1
-
Filesize
10KB
MD5673054a5fe45f5e511ee268ce1c40694
SHA1de5dbbaabe8e74b4e5e818bb0e3a4ef7086aae9c
SHA2566ab13a3d1092bdd596526c332ff509f583212bf9879b2626eff638aef9198f58
SHA512f5546e46e462af4784743e362e43e9cb22d1f0b116adb22bbb165c4593110f8db432605b1b64e11e0dd4c5066c74e7e77ef3bb314f44153079c3edbe50e26d68
-
Filesize
8KB
MD5c844a97162836bcb53e974a5e2118382
SHA156a05d94849af77a4be0b3345b599cccda79110c
SHA2566a4860e8d05db0dd1af2bcff5933f7066717e59c3119f443cf9f0df5fd9d546e
SHA512a2fad2192890a74aa54bd5fe14f2f4ef13d43abf8d3086488e7c494bc064a971a05697792997db558771e08f53e41648822ff59d5b9c4d82e63f25e63f1379e1
-
Filesize
1.8MB
MD518cbe55c3b28754916f1cbf4dfc95cf9
SHA17ccfb7678c34d6a2bedc040da04e2b5201be453b
SHA256248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b
SHA512e1d4a7ab164a7e4176a3e4e915480e5c60efe7680d99f0f0bcbd834a4bec1798b951c49ef5c0cca6bea3c2577b475de3c51b2ef1ae70b525d046eb06591f7110
-
Filesize
90B
MD55a115a88ca30a9f57fdbb545490c2043
SHA167e90f37fc4c1ada2745052c612818588a5595f4
SHA25652c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d
SHA51217c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe
-
Filesize
100KB
MD5e0f8b21b36fee4e7738a6b5a1ab83673
SHA1e305d55d4d47bfa62eae5f8e6f34e5b133a6f40b
SHA256c567d825d19e24343647ed36c77033fb1f46f420384745a9734618684cb7d384
SHA512716e6624ff87c859d08e2bbcda1137a2386d30b5b9ef545daf2c6585bc3366561773b9ad6c719a1ad99f1bacb219544ae4556629b355250e2234a7f87d24e238
-
Filesize
1.7MB
MD5847ee3021803e4adaefcc00aa8283017
SHA187644df0985b5ef9791c72ce79f423350629659e
SHA2564611614d9c95b0d0e4bf4aa486cc700db6e49dbef7fa2726b20f165e6798a9f7
SHA5121aaea476c061160439439d2dadc05e451166faa5614ccf8960b592df6933d07c867ab8813c08026b8b2c35b20b03dc0d26641e228fe06cff8c4938367e515b38
-
Filesize
1.8MB
MD5cfbb3be155b12d0cc69e3d932fbb81eb
SHA1fb5ed48a80131043c4dd2e4ac69b4b38578f9753
SHA256fd37c07f519f522eb717a372299525f667439b8b0d1aaffb670a011dbbcd58f2
SHA51238aadedee5bd57c7f475e96d74abbb0e671bca462c2c700b7a034e2d1513bd8aebc30b7b75bf1e8cd7b7e3a831e69d5dd0ceaee3d18ed296a2cb3d1b051164cc
-
Filesize
1.2MB
MD5252043d1805587b0e65a07f885d6719e
SHA12210de44be60ba496ea5d4068e715c1308066989
SHA25666839bc22b9c9f717198cf8faa64146fe95dff51dfbb8c0f61982f2e50e89557
SHA512dbcdb0b6fe37cf2c733b6683c2e245008400c84b59450f34a794e513955aaf392982e20f2eb2fce696eec2574fe15f699841748a21fce6a1e20a4381fd52f950
-
Filesize
1.6MB
MD57d377f5e1ba6597ff2cfe4f92639367d
SHA1188ab803c9926ff3448c458030f418099ea03407
SHA256c705efd2888dfbede96714b58aede50a28b3da45aba83a909cb104ce34dc735e
SHA5122adad69f3a358ad955b00c8d7826c396feef9d583407d4c7d53ce3e16ed760f148f553f49df5bbcd6c5c68b87bcf7e1472d3c789946b23dab7ae94b4036540e6
-
Filesize
725KB
MD5403a939a04b4384204d35dbc659bf772
SHA1a5424bc4b18c00fd261d71861fad75502a963397
SHA25675d5ae4d95b66cb33ccb1b8c39adda5b287ab6c44b11aa42b8f3351024fce1fc
SHA512860d17990d95694bd7e799b22e6af6fd93a20276439829e945f9aff079b6c708851e8b3e55200b8ef97d41d91608911a414b4a69c26e5593b9b4ca8a134ddbe8
-
Filesize
1.8MB
MD5ca7a5693b5b0e8b54d6dad6a5b1b86b5
SHA149da08ec9be5e002b0d22dd630182c3a905c76c7
SHA2562d66fdf0417c3d3612015ff191a2010f78fffda1b1f2ed7682181ed7c8fa7c12
SHA51268ac5c2bb689bbfc903cd2a13fe9ecf998b442690ef41d88f611ce40cb8cca1d795099cd40bc7f5325203e6314baf6a537d8369be78ecb1703f8cfc75cf26158
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783