Overview
overview
4Static
static
1custom/about.html
windows7-x64
3custom/about.html
windows10-2004-x64
3custom/header.html
windows7-x64
3custom/header.html
windows10-2004-x64
3custom/help.html
windows7-x64
3custom/help.html
windows10-2004-x64
3dialog/dialog.html
windows7-x64
3dialog/dialog.html
windows10-2004-x64
3dialog/js/dialog.js
windows7-x64
3dialog/js/dialog.js
windows10-2004-x64
3node_modul...mkdirp
ubuntu-18.04-amd64
3node_modul...mkdirp
debian-9-armhf
4node_modul...mkdirp
debian-9-mips
3node_modul...mkdirp
debian-9-mipsel
3node_modul...rp.cmd
windows7-x64
1node_modul...rp.cmd
windows10-2004-x64
1node_modul...rp.ps1
ubuntu-18.04-amd64
1node_modul...rp.ps1
debian-9-armhf
1node_modul...rp.ps1
debian-9-mips
1node_modul...rp.ps1
debian-9-mipsel
1node_modul...rimraf
ubuntu-18.04-amd64
3node_modul...rimraf
debian-9-armhf
4node_modul...rimraf
debian-9-mips
3node_modul...rimraf
debian-9-mipsel
3node_modul...af.cmd
windows7-x64
1node_modul...af.cmd
windows10-2004-x64
1node_modul...af.ps1
ubuntu-18.04-amd64
1node_modul...af.ps1
debian-9-armhf
1node_modul...af.ps1
debian-9-mips
1node_modul...af.ps1
debian-9-mipsel
1node_modul...DME.js
windows7-x64
3node_modul...DME.js
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
custom/about.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
custom/about.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
custom/header.html
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
custom/header.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
custom/help.html
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
custom/help.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
dialog/dialog.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
dialog/dialog.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
dialog/js/dialog.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
dialog/js/dialog.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
node_modules/.bin/mkdirp
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral12
Sample
node_modules/.bin/mkdirp
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral13
Sample
node_modules/.bin/mkdirp
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral14
Sample
node_modules/.bin/mkdirp
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral15
Sample
node_modules/.bin/mkdirp.cmd
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
node_modules/.bin/mkdirp.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
node_modules/.bin/mkdirp.ps1
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
node_modules/.bin/mkdirp.ps1
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral19
Sample
node_modules/.bin/mkdirp.ps1
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
node_modules/.bin/mkdirp.ps1
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral21
Sample
node_modules/.bin/rimraf
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral22
Sample
node_modules/.bin/rimraf
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral23
Sample
node_modules/.bin/rimraf
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral24
Sample
node_modules/.bin/rimraf
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral25
Sample
node_modules/.bin/rimraf.cmd
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
node_modules/.bin/rimraf.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
node_modules/.bin/rimraf.ps1
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral28
Sample
node_modules/.bin/rimraf.ps1
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral29
Sample
node_modules/.bin/rimraf.ps1
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral30
Sample
node_modules/.bin/rimraf.ps1
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral31
Sample
node_modules/balanced-match/README.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
node_modules/balanced-match/README.js
Resource
win10v2004-20241007-en
General
-
Target
custom/help.html
-
Size
87B
-
MD5
81b539baf34c1c9a739322d713ae0ca3
-
SHA1
333fa26a460e5247e51e56dd2eab64526a16ab4e
-
SHA256
a6a4f9d919b3fa814476cafd73ddeab572c659074e7e559fc4a43ba48dd9aa01
-
SHA512
d14d22e661ab7fbd3673369f1071b10a4fde752a464c0ae0c3118fe989ba3b70fa209e23d10d564785edf2e261a73f7b64f57f4d80a1685da4b7bd32984158c6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 872 msedge.exe 872 msedge.exe 2936 identity_helper.exe 2936 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 3552 872 msedge.exe 82 PID 872 wrote to memory of 3552 872 msedge.exe 82 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 4716 872 msedge.exe 83 PID 872 wrote to memory of 2252 872 msedge.exe 84 PID 872 wrote to memory of 2252 872 msedge.exe 84 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85 PID 872 wrote to memory of 4812 872 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\custom\help.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b00e46f8,0x7ff9b00e4708,0x7ff9b00e47182⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,16142727514046641646,7048788689045205722,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD51ee38022f2ce85dfae408e4ce01670ae
SHA16434dea398c3abaa938385eb4fe4a3822ab37f54
SHA25673d0c2a18911eae525ad4c748013a15d463a98ee3dc6b71fb5aff717eded81ad
SHA51292c93953b9365c53570d5c2b3f539f40a7fd2486d4a6cd7238bf780ae48f348f57acf33ea9713b51cc6e4109ca322c0cf287042f509f551346b5781b0aea3a0f
-
Filesize
1KB
MD5665d13f7e37c48c787a0fcb618677b78
SHA1501b0986dd493ce0c7081df943056109fb20594c
SHA256941349af146261a2d031c1d836d4f3c0f1d97562b1df10164ce9f5aec0a7e159
SHA5120a1412adb9012b5d47e6105c25163fc9e66eaaa70aba4eebf99ba5302de0651e6d4c776c1457dd6e0854ab9e85d5c0822b176f4fe2572fef86faf487d4b67125
-
Filesize
5KB
MD52d3ba8c86c62cca9385ec4748df921d2
SHA1331c4ca7e8a21f859abd79bd8630bca00c5da606
SHA256c3156b7fda24f8eb97c26bb5f97c3a8cc01d87edebf5c60541d03d7c03e3ab88
SHA512df676a10c01cc408afe47a10436ee5207f80b7daa6f902d48ddeb272b5b3993c9f0bae86dca7a7670bba9fd2a778afc968b236d8bbf1bcdca36b538bf369c776
-
Filesize
6KB
MD54d57ab875b58ec92a91e612b1a9e76fd
SHA1f867489c2f845431ebf0318b21108afc544c6f1b
SHA256568bdcc3aaffc358ff829560d19b3cf01269573282593c7cf5ae51f8b841816f
SHA512b6bd2d4d59ba48561de0f09eb3eafffe1112b4665ed5ed9035181a5ce66c3c9d14ce3dd08334b3efaa0342a1575bad6cf040de0969805d4f557095b49902a608
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD504815a5d00c904d3d59b82d31bb8bcec
SHA1f6c7b133e4df138a4cdf9a177d656784b4b6fa31
SHA256923ab238b1f27ee1570d0053ae6b67d86d9426a4c45186b21add75cd9ca6692f
SHA5120ce4a55822274854de5c08470a8c4640d28ea67132a324d8406552df21f815fc1ef1cbbb408ce360da9a1b91006379f403d5217e4cadcc2e508e7043877d075b