Resubmissions
23-11-2024 15:06
241123-sgspbatkbr 10Analysis
-
max time kernel
299s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
Resource
win10v2004-20241007-en
General
-
Target
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
-
Size
783KB
-
MD5
e33af9e602cbb7ac3634c2608150dd18
-
SHA1
8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe
-
SHA256
8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75
-
SHA512
2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418
-
SSDEEP
12288:0E9uQlDTt8c/wtocu3HhGSrIilDhlPnRq/iI7UOvqF8dtbcZl36VBqWPH:FuqD2cYWzBGZohlE/zUD8/bgl2qW/
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023b7a-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe -
Executes dropped EXE 1 IoCs
pid Process 3708 DPBJ.exe -
Loads dropped DLL 4 IoCs
pid Process 2284 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 3708 DPBJ.exe 3708 DPBJ.exe 3708 DPBJ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPBJ Agent = "C:\\Windows\\SysWOW64\\28463\\DPBJ.exe" DPBJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_07.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_34.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_40.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_42.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_56.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_17.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_55.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_53.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_01.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_03.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_16.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_51.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_28.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_32.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_19.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_02.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.006 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_44.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_14.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_18.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_43.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_51.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_54.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_02.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_45.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_23.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_30.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_35.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_44.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_19.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_48.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_52.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_36.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_42.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_55.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_20.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_43.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_07.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_39.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_46.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_15.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_28.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_20.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_17.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_26.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_04.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_13.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_15.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_12.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_46.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_53.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_42.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_37.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_13.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_49.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_34.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_09_43.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_47.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_11.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__15_11_20.jpg DPBJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPBJ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}\1.0\FLAGS\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}\1.0\FLAGS\ = "0" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\TypeLib\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\TypeLib\ = "{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\InprocServer32\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\ProgID DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}\1.0\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}\1.0\FLAGS DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\Version DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\VersionIndependentProgID\ = "SAPI.SpStream" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\InprocServer32\ = "%SystemRoot%\\SysWow64\\Speech_OneCore\\Common\\sapi_onecore.dll" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\ProgID\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\ProgID\ = "SAPI.SpStream.1" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\Version\ = "5.4" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\VersionIndependentProgID\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7}\1.0 DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\TypeLib DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\VersionIndependentProgID DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\Version\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE} DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\ = "Lonojeva.Cavada" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26B0A2C6-D5FF-4094-EEA1-82F4C8C920DE}\InprocServer32 DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B183F75C-107B-CA2B-4FFF-B2B807E9C7F7} DPBJ.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 552 identity_helper.exe 552 identity_helper.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3708 DPBJ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3708 DPBJ.exe Token: SeIncBasePriorityPrivilege 3708 DPBJ.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3708 DPBJ.exe 3708 DPBJ.exe 3708 DPBJ.exe 3708 DPBJ.exe 3708 DPBJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 3708 2284 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 83 PID 2284 wrote to memory of 3708 2284 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 83 PID 2284 wrote to memory of 3708 2284 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 83 PID 4896 wrote to memory of 4472 4896 msedge.exe 106 PID 4896 wrote to memory of 4472 4896 msedge.exe 106 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3424 4896 msedge.exe 107 PID 4896 wrote to memory of 3592 4896 msedge.exe 108 PID 4896 wrote to memory of 3592 4896 msedge.exe 108 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109 PID 4896 wrote to memory of 4332 4896 msedge.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\28463\DPBJ.exe"C:\Windows\system32\28463\DPBJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb905d46f8,0x7ffb905d4708,0x7ffb905d47182⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4aa4447c-edc8-428e-8369-6c8a9f56fabb.tmp
Filesize6KB
MD572864b60f15833aeb911fb013429418f
SHA1a418bb19d80eeffc7bea749879925fc4eec7140d
SHA2563501c0b26c95d8f58b7c873afb3fb68cf884a103fed593bbf4e9bb0d9ed7b90d
SHA512605f0614e4162d6bf465b9bebb2cee1b9a1338d42a7826549dbb640ab1cfd344dc87465f88bd48a3bae3465fa1dec18d804a82b8268a03bdb3202882dec345c2
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD5129724bc64f47d26bcd586e0fae9cc05
SHA1be037b28c532d6643e5da2134f068a116b935621
SHA256832b37fed6a2980c58060d5f3eb9dd867f4d9435613273264cae7cdd6007b9fd
SHA512e8594a44fa9e9fa3a32e41d6143351e08151a49753bf48ada0cb54d6519ec07f15d5debf41af370992a9353437e2ac80092e42588c3340ec54da4bf1aacb500b
-
Filesize
6KB
MD5bf36dbabcd9fd98c199a3c6f70169063
SHA1f618f6bef8d643991ed08efe87f6db49c54dbc33
SHA2566822890c0f2d7390ba0d7861673aa3d4b36dae5e1f717e68fb3ba32ec596ae03
SHA51213df00d365bf8bdb2698fe004321ceb9de23a07b946dd626b5645cb7f925579072d78b12a009457eebe306b840c49cfea34874a1c4e9b06e62c08f34a68248e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56926a087117fdec58f9cf0b66897e9b5
SHA18fa2c76e21bf3815e4c3d0d786c32f671dc9352a
SHA2563ec28c94ad134237b924109c410169f904e5a6f3e11a72bb02f6198f27612e07
SHA51241d3b7a9ad2549b9481421c5f014e9d5b27bf3cf366b3205c970b0b3ef42ffc12195e1c5c8fe18e2486a8f33728e1462c3b4ea0a77fcb2959d0fa74497924c65
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
492B
MD57a0f1fa20fd40c047b07379da5290f2b
SHA1e0fb8305de6b661a747d849edb77d95959186fca
SHA256b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6
SHA512bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
1.6MB
MD56ac950da34ec0c0c451f0dbb083b3e96
SHA16c66786307e506b4b20267532a2868e8f13a463a
SHA256d2523b967f71c87150c815c3d325f39d9e3ea465ea6e60640e3a791aa2f62c85
SHA512a6d2e1ae407f5461506880bbf57a7d4c2cbe085bb750914f6cfa51733a8d21d70fdc749e91984ddf42b29e8ebb732bbe3498721d2b9864d941fec536cd340e43
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
117KB
MD5aacb984180db9772bb0fce84bcf26b79
SHA14f149847c58c3d642a1755ab9991663eaa3af9c1
SHA2561725e510b568d6afba085c8de14b4bd6f1de41f89d2db86da05dbf50e12e44b0
SHA5122809b394cda0e9e823952da237c0f2883d0e0ac1c59484939a0634b8b0ab4103dc71431877e7298ff4bd58d33963caadc377e6bfeb69675da6be35aa837a27eb
-
Filesize
36KB
MD5e31de56674f89ebb45c39318136bb538
SHA1b706e44cdd35a29394785af137e4c5584547ccd0
SHA2569e8441137afa7d2e000232ea0f390018bce59519f785bb15e3e185d461913e79
SHA5124b64ecf1539b3ac3004af72760f56f528d4fc82eb70384f5384b57535b2915b373644005c2946750ed125babb625c95c5521ffb91406805671773bb5439d1b15
-
Filesize
36KB
MD5e9a1caf3be50ec2a0ab393fe7a565baa
SHA17215ffbf0f3c1ae08385c1ec0fc236e79c3c2fb8
SHA256881708b9eaacec24911b298b03d635bf1def910a6f6b28de90167f75966a73f4
SHA51283b33c4c79d1fc18f38a043f07e3f04889b9e8f19d98a540ec92a06fe43bdf08e7b4773aef3d08f9920b5f129abe04f0e0da1ab5fdd0703ce152c5c4a7443faa
-
Filesize
142KB
MD5bc05abc1c4861610327677e86dd7ddc4
SHA146ca3800d7f24f4c7fbb71e0bba976234a3905fd
SHA2563808af06251a0c3bfebec6b47b1e99661d9954939141fb9efdffadac8330215c
SHA51204240ce94f89c498dd2cea141896be16546929ae69b2cb1d0dea48b73183c0c6f4947e9d167f9f10894c67152ed0947199063d0e5fe0a6e125c27d46637cfb47
-
Filesize
145KB
MD52c71a6b7e0628992ae4b1a4fcabda519
SHA1ca8d590c2045a95ea0a656512d487575e8c93d73
SHA256ceb5d9fdea84d3f50b96a8e7cc327ed11b03321065e7b5f365c1b5f40351bf93
SHA5124a881bf721f78f90f60e246a07331a8d1f19fb435bca5a5398e7cf45123d313d7e5f329c1a252bb98fa795619cb267759dd2ba74362bfe4ea3b285f14a40af66
-
Filesize
142KB
MD558deff3f8e82aa11123031c06d062b09
SHA1d5089454179a2baaa2f0cec088caf592da096482
SHA256cb22656c9abc225cb7bc141e0b57a9fd09eff25519cb3993572c9043bd77619d
SHA512e7079fef0de6fd8918f03cd049fa3d06ac357b1a3a295a31aeba2a2ed18d1b34a4df4ad45f9fd7af89e51c2d80e3d47d082967d14d9beac11f87309ac9d6ec3a
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2