Overview
overview
4Static
static
3Hemingway ...om.ps1
windows7-x64
3Hemingway ...om.ps1
windows10-2004-x64
3Hemingway ...or.exe
windows7-x64
3Hemingway ...or.exe
windows10-2004-x64
3Hemingway ...m.html
windows7-x64
3Hemingway ...m.html
windows10-2004-x64
3Hemingway ...ell.js
windows7-x64
3Hemingway ...ell.js
windows10-2004-x64
3Hemingway ...47.dll
windows7-x64
3Hemingway ...47.dll
windows10-2004-x64
3Hemingway ...eg.dll
windows7-x64
3Hemingway ...eg.dll
windows10-2004-x64
3Hemingway ...GL.dll
windows7-x64
3Hemingway ...GL.dll
windows10-2004-x64
3Hemingway ...v2.dll
windows7-x64
3Hemingway ...v2.dll
windows10-2004-x64
3Hemingway ...lob.js
windows7-x64
3Hemingway ...lob.js
windows10-2004-x64
3Hemingway ...de.dll
windows7-x64
3Hemingway ...de.dll
windows10-2004-x64
3Hemingway ...p.asar
windows7-x64
3Hemingway ...p.asar
windows10-2004-x64
3Hemingway ...cli.js
ubuntu-18.04-amd64
3Hemingway ...cli.js
debian-9-armhf
4Hemingway ...cli.js
debian-9-mips
1Hemingway ...cli.js
debian-9-mipsel
1Hemingway ...dex.js
windows7-x64
3Hemingway ...dex.js
windows10-2004-x64
3Hemingway ...dex.js
windows7-x64
3Hemingway ...dex.js
windows10-2004-x64
3Hemingway ..._mo.js
windows7-x64
3Hemingway ..._mo.js
windows10-2004-x64
3Analysis
-
max time kernel
241s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
Hemingway Editor 3.0.6/App/AppInfo/Launcher/Custom.ps1
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Hemingway Editor 3.0.6/App/AppInfo/Launcher/Custom.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/Hemingway Editor.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/Hemingway Editor.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/LICENSES.chromium.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/content_shell.js
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/content_shell.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/d3dcompiler_47.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/ffmpeg.dll
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/natives_blob.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/natives_blob.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/node.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/node.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/cli.js
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral24
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/cli.js
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral25
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/cli.js
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral26
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/cli.js
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral27
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/index.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/lib/index.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_modules/flow-bin/lib/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_mo.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Hemingway Editor 3.0.6/App/Hemingway Editor/resources/app.asar.unpacked/draft-js-import-html/node_mo.js
Resource
win10v2004-20241007-en
General
-
Target
Hemingway Editor 3.0.6/App/Hemingway Editor/LICENSES.chromium.html
-
Size
1.3MB
-
MD5
05bb8752fae55b36f44c703cee71e618
-
SHA1
b03383ba85a4d27b8b1bb2b4edc0e5f987e197dd
-
SHA256
582d89f9af44753a4ce9a207f00fc84b25549e23176d2b2f87991671099d241c
-
SHA512
adbcd665afbabfca6b91c0745dfcf964416a6f91f490cc38b1a047f23e789ed7843fc9365e272f28d307b063a38140dc40c5555af5ee06f8a88e7a641dc06e33
-
SSDEEP
12288:xm3m4mqm/mfmgCHzA+Sx2cXrDCRm0FtZZmS6h3BbZrS7Ui61GQqbdWHzW3V1GfoC:Fjtpw2BNuxQBZrCr+KDeclkUhqQqo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1692 msedge.exe 1692 msedge.exe 4112 identity_helper.exe 4112 identity_helper.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 4708 1692 msedge.exe 82 PID 1692 wrote to memory of 4708 1692 msedge.exe 82 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 2016 1692 msedge.exe 83 PID 1692 wrote to memory of 1180 1692 msedge.exe 84 PID 1692 wrote to memory of 1180 1692 msedge.exe 84 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85 PID 1692 wrote to memory of 3804 1692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff866246f8,0x7fff86624708,0x7fff866247182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5854747068777401748,17263108411992319252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
5KB
MD5d58a03f1fddf9bdf1ecbb54d36586308
SHA1c4dd6780f5a13f89ccf985c4902925da05c3c161
SHA2565fd8ce13951cdded2d8a4fef7b0b27f836dbe2183176146f9228b5adbfb4432a
SHA5121cbecd7957f1238e5f8b03d9aca38e9d9f16c9dacff9da5eab265d3b3025fcdd74ae09d6f9aabd0d53b53bcfaa9d0fd6aa6347966a8f42ffa20ae76d01a41e67
-
Filesize
6KB
MD540b4b0a002d416a73c5727a7871af73d
SHA11ffe1638c06c0d68cd924dd1cdb4613aa6edb5f7
SHA256c5647b205cffc5194de5c00411d8b1c6e221183249478587d510872eec682fbf
SHA512314ca4d9f76b6cfd7cc6d12e8c1d615d92aad49cba10de66829406343747dca5bfdb907562fa2dc08b99feaa8e1ab9d6d28907808d4779e68dfb520be28635ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53dca3e95e592b90d1854e04ed68ba8a0
SHA175e861ce713f8dcb2176a597effd40da4c257381
SHA2565aeff1f79f0b6013ac1e1065719215266baa1ddf7d26d772aa77ef313c4d8b9d
SHA512ec49fc0334d8a277ad89adceebd4663560f20b8033d1576bf3112488e7021d4f5b54c59bfdf38034f4c775fe4a6fb1b92cfbf46891e843418b186598372796bb