Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:00
Behavioral task
behavioral1
Sample
AppleCleaner [I DO NOT OWN IT].exe
Resource
win10v2004-20241007-en
General
-
Target
AppleCleaner [I DO NOT OWN IT].exe
-
Size
3.6MB
-
MD5
f96eb2236970fb3ea97101b923af4228
-
SHA1
e0eed80f1054acbf5389a7b8860a4503dd3e184a
-
SHA256
46fe5192387d3f897a134d29c069ebf39c72094c892134d2f0e77b12b11a6172
-
SHA512
2fd2d28c5f571d40b43a4dd7a22d367ba42420c29627f21ca0a2052070ffb9f689d80dad638238189eed26ed19af626f47e70f1207e10007041c620dac323cc7
-
SSDEEP
98304:z7m+ij9HD0+jCihNRkl/W6aG/wcKnfu8NUT6Ko:e+y4ihkl/Wo/afHPb
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AppleCleaner [I DO NOT OWN IT].exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4664 netsh.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AppleCleaner [I DO NOT OWN IT].exe Set value (data) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion = 62004f00340048005300200020002d002000660000000000 AppleCleaner [I DO NOT OWN IT].exe -
resource yara_rule behavioral1/memory/972-0-0x00007FF79FA00000-0x00007FF7A03A2000-memory.dmp themida behavioral1/memory/972-3-0x00007FF79FA00000-0x00007FF7A03A2000-memory.dmp themida behavioral1/memory/972-2-0x00007FF79FA00000-0x00007FF7A03A2000-memory.dmp themida behavioral1/memory/972-4-0x00007FF79FA00000-0x00007FF7A03A2000-memory.dmp themida behavioral1/memory/972-5-0x00007FF79FA00000-0x00007FF7A03A2000-memory.dmp themida behavioral1/memory/972-68-0x00007FF79FA00000-0x00007FF7A03A2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AppleCleaner [I DO NOT OWN IT].exe -
pid Process 5948 cmd.exe 3544 ARP.EXE -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer AppleCleaner [I DO NOT OWN IT].exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 972 AppleCleaner [I DO NOT OWN IT].exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4688 cmd.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily AppleCleaner [I DO NOT OWN IT].exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemBiosVersion AppleCleaner [I DO NOT OWN IT].exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral AppleCleaner [I DO NOT OWN IT].exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer AppleCleaner [I DO NOT OWN IT].exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion AppleCleaner [I DO NOT OWN IT].exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 AppleCleaner [I DO NOT OWN IT].exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "1c718210-acce715d-4" AppleCleaner [I DO NOT OWN IT].exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "27d10749-22c2722a-4" AppleCleaner [I DO NOT OWN IT].exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 5428 ipconfig.exe 5476 ipconfig.exe 5696 ipconfig.exe -
Kills process with taskkill 3 IoCs
pid Process 2368 taskkill.exe 3132 taskkill.exe 4976 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4528 msedge.exe 4528 msedge.exe 972 AppleCleaner [I DO NOT OWN IT].exe 972 AppleCleaner [I DO NOT OWN IT].exe 5808 identity_helper.exe 5808 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 3132 taskkill.exe Token: SeDebugPrivilege 4976 taskkill.exe Token: SeIncreaseQuotaPrivilege 6068 WMIC.exe Token: SeSecurityPrivilege 6068 WMIC.exe Token: SeTakeOwnershipPrivilege 6068 WMIC.exe Token: SeLoadDriverPrivilege 6068 WMIC.exe Token: SeSystemProfilePrivilege 6068 WMIC.exe Token: SeSystemtimePrivilege 6068 WMIC.exe Token: SeProfSingleProcessPrivilege 6068 WMIC.exe Token: SeIncBasePriorityPrivilege 6068 WMIC.exe Token: SeCreatePagefilePrivilege 6068 WMIC.exe Token: SeBackupPrivilege 6068 WMIC.exe Token: SeRestorePrivilege 6068 WMIC.exe Token: SeShutdownPrivilege 6068 WMIC.exe Token: SeDebugPrivilege 6068 WMIC.exe Token: SeSystemEnvironmentPrivilege 6068 WMIC.exe Token: SeRemoteShutdownPrivilege 6068 WMIC.exe Token: SeUndockPrivilege 6068 WMIC.exe Token: SeManageVolumePrivilege 6068 WMIC.exe Token: 33 6068 WMIC.exe Token: 34 6068 WMIC.exe Token: 35 6068 WMIC.exe Token: 36 6068 WMIC.exe Token: SeIncreaseQuotaPrivilege 6068 WMIC.exe Token: SeSecurityPrivilege 6068 WMIC.exe Token: SeTakeOwnershipPrivilege 6068 WMIC.exe Token: SeLoadDriverPrivilege 6068 WMIC.exe Token: SeSystemProfilePrivilege 6068 WMIC.exe Token: SeSystemtimePrivilege 6068 WMIC.exe Token: SeProfSingleProcessPrivilege 6068 WMIC.exe Token: SeIncBasePriorityPrivilege 6068 WMIC.exe Token: SeCreatePagefilePrivilege 6068 WMIC.exe Token: SeBackupPrivilege 6068 WMIC.exe Token: SeRestorePrivilege 6068 WMIC.exe Token: SeShutdownPrivilege 6068 WMIC.exe Token: SeDebugPrivilege 6068 WMIC.exe Token: SeSystemEnvironmentPrivilege 6068 WMIC.exe Token: SeRemoteShutdownPrivilege 6068 WMIC.exe Token: SeUndockPrivilege 6068 WMIC.exe Token: SeManageVolumePrivilege 6068 WMIC.exe Token: 33 6068 WMIC.exe Token: 34 6068 WMIC.exe Token: 35 6068 WMIC.exe Token: 36 6068 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 972 wrote to memory of 2432 972 AppleCleaner [I DO NOT OWN IT].exe 86 PID 972 wrote to memory of 2432 972 AppleCleaner [I DO NOT OWN IT].exe 86 PID 2432 wrote to memory of 2368 2432 cmd.exe 87 PID 2432 wrote to memory of 2368 2432 cmd.exe 87 PID 972 wrote to memory of 4688 972 AppleCleaner [I DO NOT OWN IT].exe 89 PID 972 wrote to memory of 4688 972 AppleCleaner [I DO NOT OWN IT].exe 89 PID 4688 wrote to memory of 3132 4688 cmd.exe 91 PID 4688 wrote to memory of 3132 4688 cmd.exe 91 PID 972 wrote to memory of 700 972 AppleCleaner [I DO NOT OWN IT].exe 92 PID 972 wrote to memory of 700 972 AppleCleaner [I DO NOT OWN IT].exe 92 PID 700 wrote to memory of 4976 700 cmd.exe 93 PID 700 wrote to memory of 4976 700 cmd.exe 93 PID 972 wrote to memory of 3936 972 AppleCleaner [I DO NOT OWN IT].exe 101 PID 972 wrote to memory of 3936 972 AppleCleaner [I DO NOT OWN IT].exe 101 PID 3936 wrote to memory of 4528 3936 cmd.exe 102 PID 3936 wrote to memory of 4528 3936 cmd.exe 102 PID 4528 wrote to memory of 868 4528 msedge.exe 105 PID 4528 wrote to memory of 868 4528 msedge.exe 105 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 2884 4528 msedge.exe 106 PID 4528 wrote to memory of 4916 4528 msedge.exe 107 PID 4528 wrote to memory of 4916 4528 msedge.exe 107 PID 4528 wrote to memory of 2068 4528 msedge.exe 108 PID 4528 wrote to memory of 2068 4528 msedge.exe 108 PID 4528 wrote to memory of 2068 4528 msedge.exe 108 PID 4528 wrote to memory of 2068 4528 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\AppleCleaner [I DO NOT OWN IT].exe"C:\Users\Admin\AppData\Local\Temp\AppleCleaner [I DO NOT OWN IT].exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Checks system information in the registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe >nul 2>&12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Battle.net.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\system32\taskkill.exetaskkill /f /im Battle.net.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start https://applecheats.cc2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://applecheats.cc/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb750e46f8,0x7ffb750e4708,0x7ffb750e47184⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:24⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:84⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:14⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:14⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:14⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:14⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:14⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:14⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:14⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:14⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:14⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:14⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:14⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7096 /prefetch:84⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5194935948492463844,14918379493489803061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7096 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5808
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:6000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH WINSOCK RESET >nul 2>&12⤵PID:6016
-
C:\Windows\system32\netsh.exeNETSH WINSOCK RESET3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INT IP RESET >nul 2>&12⤵PID:6104
-
C:\Windows\system32\netsh.exeNETSH INT IP RESET3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall reset >nul 2>&12⤵PID:2356
-
C:\Windows\system32\netsh.exenetsh advfirewall reset3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INTERFACE IPV4 RESET >nul 2>&12⤵PID:5080
-
C:\Windows\system32\netsh.exeNETSH INTERFACE IPV4 RESET3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INTERFACE IPV6 RESET >nul 2>&12⤵PID:4452
-
C:\Windows\system32\netsh.exeNETSH INTERFACE IPV6 RESET3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:8
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INTERFACE TCP RESET >nul 2>&12⤵PID:5232
-
C:\Windows\system32\netsh.exeNETSH INTERFACE TCP RESET3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INT RESET ALL >nul 2>&12⤵PID:5160
-
C:\Windows\system32\netsh.exeNETSH INT RESET ALL3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /RELEASE >nul 2>&12⤵PID:5412
-
C:\Windows\system32\ipconfig.exeIPCONFIG /RELEASE3⤵
- Gathers network information
PID:5428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /RELEASE >nul 2>&12⤵PID:4996
-
C:\Windows\system32\ipconfig.exeIPCONFIG /RELEASE3⤵
- Gathers network information
PID:5476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /FLUSHDNS >nul 2>&12⤵PID:5736
-
C:\Windows\system32\ipconfig.exeIPCONFIG /FLUSHDNS3⤵
- Gathers network information
PID:5696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NBTSTAT -R >nul 2>&12⤵PID:5444
-
C:\Windows\system32\nbtstat.exeNBTSTAT -R3⤵PID:5780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NBTSTAT -RR >nul 2>&12⤵PID:5792
-
C:\Windows\system32\nbtstat.exeNBTSTAT -RR3⤵PID:1572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c arp -a >nul 2>&12⤵
- Network Service Discovery
PID:5948 -
C:\Windows\system32\ARP.EXEarp -a3⤵
- Network Service Discovery
PID:3544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c arp -d >nul 2>&12⤵PID:6004
-
C:\Windows\system32\ARP.EXEarp -d3⤵PID:1200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c WMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE >nul 2>&12⤵PID:6100
-
C:\Windows\System32\Wbem\WMIC.exeWMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:6068
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD5646f19e2864db3a1a5f8780c06946129
SHA1cacab8b1fe48eac114e100fbf6040ae408773a85
SHA2565109aa63bdbefae9e415faeead1a227ecf2cf615a5ecc3505e6634a08766fe6f
SHA512671fcb05b2510daf03b7da0bb625d558dd7d40d4112bad705555a196caac5f48adeda1aaa09088d07e0c5c0619f61d2db0d9e412ae184594115eff844d69abcf
-
Filesize
24KB
MD5891ceda1d816c3913da6482bbbf2c77e
SHA187e955b44a37fe18881343a4f9d752ef9a48e63d
SHA2565b6550d1573836d5e4f4893c383145959abae297fbf9e02bad5e05a76d616e9e
SHA512b8bf073c544cc999cbe96ede2456436fadfaf462da21e7bc8ef19a9cc18c7095efcc9da835db3090b802ca5d33adbcb9865fae0630435e6c1bd01dc2aa7b7084
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389