Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
ORDER AND SPECIFICATIONS.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER AND SPECIFICATIONS.scr
Resource
win10v2004-20241007-en
General
-
Target
ORDER AND SPECIFICATIONS.scr
-
Size
1.2MB
-
MD5
08b5fa6876e0dc8d5c226597d89e646b
-
SHA1
4b5f7b0dd2303c81427f9ab47ff9046c43718552
-
SHA256
402dc87138121e2ac00c7bc65bbdd39a9ab0091c3a1b163066924887a20ab361
-
SHA512
4f20a03dbcb5e16c4e934e67455eb48bf7bd9681b5fdc731bf278409c78e698527ee125ac2ed0e3f09bc1551a2684e16ba3e34613da9a1eb32bca781b85ea48c
-
SSDEEP
24576:IPMpzxWvSQVw/BSCDyBSvbSFMySqL1fjv4G4uKZ0PU:JWvxiSCWBSzsVL1fktec
Malware Config
Extracted
remcos
RemoteHost
154.216.16.54:6092
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YJ70D0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
true
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2464 powershell.exe 2268 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ORDER AND SPECIFICATIONS.scrremcos.exeORDER AND SPECIFICATIONS.scrdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ORDER AND SPECIFICATIONS.scr Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation remcos.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ORDER AND SPECIFICATIONS.scr -
Executes dropped EXE 3 IoCs
Processes:
remcos.exeremcos.exeremcos.exepid process 2692 remcos.exe 4308 remcos.exe 1544 remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
remcos.exeORDER AND SPECIFICATIONS.scrdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-YJ70D0 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-YJ70D0 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" ORDER AND SPECIFICATIONS.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-YJ70D0 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" ORDER AND SPECIFICATIONS.scr Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-YJ70D0 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ORDER AND SPECIFICATIONS.scrremcos.exeremcos.exedescription pid process target process PID 2900 set thread context of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2692 set thread context of 1544 2692 remcos.exe remcos.exe PID 1544 set thread context of 1680 1544 remcos.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
iexplore.exeORDER AND SPECIFICATIONS.scrORDER AND SPECIFICATIONS.scrpowershell.exeremcos.exeremcos.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER AND SPECIFICATIONS.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER AND SPECIFICATIONS.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exeremcos.exeremcos.exepowershell.exemsedge.exemsedge.exeidentity_helper.exepid process 2464 powershell.exe 2464 powershell.exe 2692 remcos.exe 2692 remcos.exe 1544 remcos.exe 1544 remcos.exe 2268 powershell.exe 2268 powershell.exe 2956 msedge.exe 2956 msedge.exe 2272 msedge.exe 2272 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
remcos.exepid process 1544 remcos.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeremcos.exepowershell.exedescription pid process Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 2692 remcos.exe Token: SeDebugPrivilege 2268 powershell.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ORDER AND SPECIFICATIONS.scrORDER AND SPECIFICATIONS.scrremcos.exeremcos.exeiexplore.exemsedge.exedescription pid process target process PID 2900 wrote to memory of 2464 2900 ORDER AND SPECIFICATIONS.scr powershell.exe PID 2900 wrote to memory of 2464 2900 ORDER AND SPECIFICATIONS.scr powershell.exe PID 2900 wrote to memory of 2464 2900 ORDER AND SPECIFICATIONS.scr powershell.exe PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 2900 wrote to memory of 644 2900 ORDER AND SPECIFICATIONS.scr ORDER AND SPECIFICATIONS.scr PID 644 wrote to memory of 2692 644 ORDER AND SPECIFICATIONS.scr remcos.exe PID 644 wrote to memory of 2692 644 ORDER AND SPECIFICATIONS.scr remcos.exe PID 644 wrote to memory of 2692 644 ORDER AND SPECIFICATIONS.scr remcos.exe PID 2692 wrote to memory of 2268 2692 remcos.exe powershell.exe PID 2692 wrote to memory of 2268 2692 remcos.exe powershell.exe PID 2692 wrote to memory of 2268 2692 remcos.exe powershell.exe PID 2692 wrote to memory of 4308 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 4308 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 4308 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 2692 wrote to memory of 1544 2692 remcos.exe remcos.exe PID 1544 wrote to memory of 1680 1544 remcos.exe iexplore.exe PID 1544 wrote to memory of 1680 1544 remcos.exe iexplore.exe PID 1544 wrote to memory of 1680 1544 remcos.exe iexplore.exe PID 1544 wrote to memory of 1680 1544 remcos.exe iexplore.exe PID 1680 wrote to memory of 2272 1680 iexplore.exe msedge.exe PID 1680 wrote to memory of 2272 1680 iexplore.exe msedge.exe PID 2272 wrote to memory of 4440 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 4440 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe PID 2272 wrote to memory of 2784 2272 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATIONS.scr"C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATIONS.scr" /S1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATIONS.scr"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATIONS.scr"C:\Users\Admin\AppData\Local\Temp\ORDER AND SPECIFICATIONS.scr"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
PID:4308
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.06⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb9c946f8,0x7ffeb9c94708,0x7ffeb9c947187⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:27⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:87⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:17⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:17⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:17⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:87⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:17⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:17⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:17⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:17⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:17⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6918401020177593590,5045050734684234571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:17⤵PID:3244
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.06⤵PID:616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb9c946f8,0x7ffeb9c94708,0x7ffeb9c947187⤵PID:4016
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD508b5fa6876e0dc8d5c226597d89e646b
SHA14b5f7b0dd2303c81427f9ab47ff9046c43718552
SHA256402dc87138121e2ac00c7bc65bbdd39a9ab0091c3a1b163066924887a20ab361
SHA5124f20a03dbcb5e16c4e934e67455eb48bf7bd9681b5fdc731bf278409c78e698527ee125ac2ed0e3f09bc1551a2684e16ba3e34613da9a1eb32bca781b85ea48c
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5df0fb668983d9fb874527897b9e1dc43
SHA12ea4c21670fc2cc0544fbb39cb5a7826c8bc8170
SHA256e7d39e5ec7fa6cceb58ccbca956b4cd40431eb1e4b1653a9299041a44f1eb337
SHA5129d5bde791642bf5504e8d14c77472eb1527112e312500d637b0abf7a97237b47254ba332078c0e3102fdf01192df4be8f5bbdf6a0199358c8a17e69467e86c8d
-
Filesize
6KB
MD5a2ccd42dc3bae07629a889940f9b2d95
SHA1fa557cce9d1331a62f7db5fd13019f0f7b0c52ff
SHA256dc32593673d969c04d4dada99227c41dc20329e8c9a4c9ec4e18f2658e9290b7
SHA5126958df27f5c1e28f618d5394ed93b6a7e55825c85bbf667a9b522544ba94bf66f77c90fabfc275d7c5d477e497a4fb026d38c64701c1720e4b380d1d4e03dc7b
-
Filesize
5KB
MD5793c7050a2a4706be524168d0fe85ccb
SHA1dfe86b3b3dd92fb2ddbd852f2a13974c03250540
SHA256fd79a0cf07f5e0f79e3d2b9527fbc475061dd32dc95780d5a9b5429185d5c4b6
SHA512f34034344cc5832a0bb38f968fe9000a65b2b9bcb63db28772fde9a244a8e716de08de80b4267be90ec3787553196821ac1c258cae1f797ec681488b7ce0a2d8
-
Filesize
6KB
MD57d79b6a3a97b8ae3a4f508fc314c9cbb
SHA1c43a77a54dae78d4611a8b0c2995e944c2e2babd
SHA256bcf6528e3265e8c060a9934648fe51a1782006d89262bf1a2db8c6d3299cd881
SHA512740507f045d8eb4467bf73fbeca0384497e366237f5d91c7462e9a94e289ff99a836f66b36794253353971b4285be1e3ac206c73d598ebd9790ae1ea1c7e8e1d
-
Filesize
371B
MD53b371346f263afefee24d2720616fbe0
SHA141cafea70d8a4b3041d9850f83a40068c64ba37e
SHA2569277eaaa51cdd8db3d140c79f4848decac1eb2dbc502b4b967e1ce72482de668
SHA512acb92b01ca29451bdd0e2dbac0251a1cbaff24bfdb696e132adcb8af1c302690952e731370768a547a351072f105e2bb974a5945703b8e2fe8886d382d7e46c5
-
Filesize
371B
MD51db8451c3e9f16e62e8d9f5d93346d27
SHA16692e5c2831a373e9b22a30837af6dd94f123d19
SHA256098e22ed6dec09980574adb27f25bbb8e88c3ec2eb0a2846ec99035d6f0a362c
SHA512c0fca919048c3c4d9d3ee964e9371a6d033f625e0600973cc2a669bd6e6bbce8da7cb921563b58131c02472807def8e68f91cbc68e335286e644ac990d82ec8f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56db0b2f1fc85aa1ea25ab28e6a007da7
SHA13dfed62c9db330b8afa7f1f20a5d6b4638be2d62
SHA256f2b1efd410a5867c884b34417d4b54bc934aa2f5ada13a7f6830a68efcdc1072
SHA51237244edbc517ddb74d5d76371618af4af95fec0310fe958f2c0b86cbfd8800a55c92f8ef7303b77426291c138010b5f9144293341b34bb592dda43b20d5dbd02
-
Filesize
18KB
MD53612f2f1c87ad7869730ae40863d0f61
SHA11de05b15043d2d9e2d2f28264cd9a419bdd4618a
SHA256f7eefecc0a8d989ab3288ea9c193f79d035d51c37041b6ba762ccc1582628217
SHA512d7f092c3d5b90e3a1b987028134610d0acb3e21f8a2144cfec4b8849f10abfb47fa2d2d60269170335d8eac3b4ae839cfa515e3032696fec37f80002e108f687
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e