Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 05:25
Behavioral task
behavioral1
Sample
2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe
-
Size
2.3MB
-
MD5
796a64f3468d20acdecb486bbafb9d54
-
SHA1
147946b22255931da9cba6bce6cedc50c76cc5e1
-
SHA256
bb846882b3def0776589b707f28a52dabacc9f7745c4943d912f33e957b32f61
-
SHA512
0dc326f3e561dd7a0b7c1c1f77d873644075dab260747d7b0b5efa52c3d47fba282ea65cee07b98286a1747b04645e05205bb586acb5281e2c0fa64327914a9d
-
SSDEEP
49152:XCkCFdSRfMMMMM2MMMMMARfMMMMM2MMMMMvnBEf2CkCFdSRfMMMMM2MMMMMARfMu:ykCuRfMMMMM2MMMMMARfMMMMM2MMMMMF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x00020000000229a4-55.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Executes dropped EXE 1 IoCs
pid Process 4680 mail.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\R: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\X: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\H: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\M: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\O: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\P: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\Z: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\B: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\K: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\N: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\W: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\L: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\T: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\U: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\A: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\E: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\G: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\J: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\I: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\S: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\V: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\Y: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\IMESEARCH.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\appidtel.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\BackgroundTransferHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\explorer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ftp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\IME\IMEJP\IMJPDCT.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\auditpol.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\dcomcnfg.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\isoburn.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\setup16.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\WinRTNetMUAHostServer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\charmap.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\runas.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\tracerpt.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\UserAccountControlSettings.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wsmprovhost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\SearchFilterHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\systray.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\IME\IMETC\IMTCLNWZ.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\eudcedit.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\Fondue.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\gpscript.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\mfpmp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\PING.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\Register-CimProvider.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\RmClient.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\TsWpfWrp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\bootcfg.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\cmd.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\mtstocom.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ndadmin.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\powercfg.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\fltMC.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\fsquirt.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\iexpress.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\mountvol.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ByteCodeGenerator.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\proquota.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\where.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\Com\MigRegDB.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wbem\WMIC.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\calc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\chkdsk.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\dllhst3g.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\label.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\pcaui.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ReAgentc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\regedt32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\autoconv.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\CloudNotifications.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\edpnotify.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\fontdrvhost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\instnm.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\resmon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\RMActivate.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\RpcPing.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wusa.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\dxdiag.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\EaseOfAccessDialog.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\RdpSaProxy.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\TpmInit.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wscript.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\LaunchTM.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\rrinstaller.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\misc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Internet Explorer\iexplore.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Internet Explorer\ielowutil.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Media Player\wmpnetwk.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pptico.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Media Player\setup_wm.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_87484\java.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Internet Explorer\ExtExport.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Internet Explorer\ieinstal.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Internet Explorer\ielowutil.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Internet Explorer\iediagcmd.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Mail\wab.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Media Player\wmpshare.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmi-core-svc_31bf3856ad364e35_10.0.19041.1_none_60f873a5caaf6704_winmgmt.exe_8f8eb7b1 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\0be59c4736e5d70107a200001815341f.appcmd.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\8e36994536e5d701189b00001815341f.iisreset.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_10.0.19041.1266_none_cfec8db821d83671_winload.exe_75835076 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid_31bf3856ad364e35_10.0.19041.1202_none_cc0c3d35675da3a1_appidpolicyconverter.exe_83972af0 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\9714214736e5d7015ba100001815341f.adamsync.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tcpip_31bf3856ad364e35_10.0.19041.746_none_3f7ee0a8ee28ef7d_netiougc.exe_94123cfe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lsa-minwin_31bf3856ad364e35_10.0.19041.1266_none_b2317523477fbd48_lsass.exe_682060de 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-onecore-pnp-drvinst_31bf3856ad364e35_10.0.19041.1202_none_ca1e0a7a1f21274c_drvinst.exe_6593e92a 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-axinstallservice_31bf3856ad364e35_10.0.19041.867_none_b4e9fc09cfcbdd7c_axinstui.exe_eba3b15b 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\a30f994536e5d701169b00001815341f.aspnetca.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\WINDOWS\IE2.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..ndowmanager-process_31bf3856ad364e35_10.0.19041.746_none_11e04cec24452336_dwm.exe_04cf416e 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wininit_31bf3856ad364e35_10.0.19041.1202_none_a5b2e5b8b986fe3d_wininit.exe_7a527f28 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_windows-defender-service_31bf3856ad364e35_10.0.19041.746_none_a39f6d9ab59bd8b7_mpcmdrun.exe_1d1038c2 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\aa9a364536e5d701869a00001815341f.inetinfo.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\ad40614236e5d701629700001815341f.UwfServicingShell.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\1ea4214236e5d7010e9700001815341f.hvsiproxyapp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\7deea44536e5d7012c9b00001815341f.InetMgr6.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core-svc_31bf3856ad364e35_10.0.19041.844_none_7eaa07ee55c22dcc_winmgmt.exe_8f8eb7b1 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.19041.546_none_93b4a0a1641d085c_svchost.exe_4dd0f0bc 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_10.0.19041.1_none_9ab96313e8d638bb_iscsicli.exe_20e14d4f 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\36f22f4236e5d701239700001815341f.nfsclnt.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\a267614236e5d701639700001815341f.UwfServicingSvc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\caae464736e5d7017ea100001815341f.InetMgr6.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Windows\Êý¾Ý¿â.ini 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\sysmon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\d0f48d4536e5d701029b00001815341f.InetMgr.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft.windows.winhttp_31bf3856ad364e35_5.1.19041.1151_none_d57e154a0a8460d3_pacjsworker.exe_6e8eaf33 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-virtualdiskservice_31bf3856ad364e35_10.0.19041.1202_none_dfaaff89afe4f3d4_vdsldr.exe_20c491b3 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid_31bf3856ad364e35_10.0.19041.1202_none_cc0c3d35675da3a1_appidcertstorecheck.exe_03352f5f 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Windows\IE2.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Speech\Common\sapisvr.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_10.0.19041.1_none_9064b8c1b47576c0_iscsicli.exe_20e14d4f 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-security-spp_31bf3856ad364e35_10.0.19041.1266_none_8f272afdd624490f_sppsvc.exe_fc6922a9 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\ea94772a36e5d701947000001815341f.tlsbln.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\explorer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\PrintDialog\PrintDialog.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasautodial_31bf3856ad364e35_10.0.19041.546_none_f827f008f8832bd5_rasautou.exe_477abe34 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\ace9914536e5d7010a9b00001815341f.WMSvc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-virtualdiskservice_31bf3856ad364e35_10.0.19041.1202_none_dfaaff89afe4f3d4_vds.exe_cb461c29 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-networkbridge_31bf3856ad364e35_10.0.19041.746_none_e5e33ba764e4ddec_bridgeunattend.exe_60b7e340 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi_31bf3856ad364e35_10.0.19041.1165_none_1ea3d2b20faf7de3_fontdrvhost.exe_94bdc76d 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_windows-defender-service_31bf3856ad364e35_10.0.19041.746_none_a39f6d9ab59bd8b7_msmpeng.exe_2f1c6923 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\e374984536e5d701109b00001815341f.iisrstas.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\WINDOWS\IE2.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_10.0.19041.1266_none_cfec8db821d83671_winresume.exe_85cd1215 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ImmersiveControlPanel\SystemSettings.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-security-lsatrustlet_31bf3856ad364e35_10.0.19041.1288_none_5961108733e967c9_lsaiso.exe_51c00eb7 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-smss-minwin_31bf3856ad364e35_10.0.19041.964_none_5c42846f47acb1a6_smss.exe_d7209c3a 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-winlogon_31bf3856ad364e35_10.0.19041.1266_none_e488d49c8a22d21e_winlogon.exe_ac37d0c5 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.19041.1237_none_a9b815907b71fe1a_wowreg32.exe_94fc2d06 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.19041.1237_none_b40cbfe2afd2c015_wowreg32.exe_94fc2d06 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\bfsvc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\write.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\b6c0024236e5d701eb9600001815341f.CustomShellHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\wow64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.19041.546_none_9e094af3987dca57_svchost.exe_4dd0f0bc 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Temp\PendingDeletes\b6c0024236e5d701ea9600001815341f.eshell.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..onment-core-tcbboot_31bf3856ad364e35_10.0.19041.1288_none_75442af2fe19577c_tcblaunch.exe_d6a1d462 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Boot\PCAT\memtest.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\WinSxS\Backup\amd64_windows-defender-nis-service_31bf3856ad364e35_10.0.19041.1_none_d3e3ad84b24cfdfe_nissrv.exe_f967cd63 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winhlp32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mail.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 3664 msedge.exe 3664 msedge.exe 4060 identity_helper.exe 4060 identity_helper.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3820 wrote to memory of 4680 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 82 PID 3820 wrote to memory of 4680 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 82 PID 3820 wrote to memory of 4680 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 82 PID 3820 wrote to memory of 3664 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 83 PID 3820 wrote to memory of 3664 3820 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 83 PID 3664 wrote to memory of 548 3664 msedge.exe 84 PID 3664 wrote to memory of 548 3664 msedge.exe 84 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 832 3664 msedge.exe 85 PID 3664 wrote to memory of 2000 3664 msedge.exe 86 PID 3664 wrote to memory of 2000 3664 msedge.exe 86 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87 PID 3664 wrote to memory of 4908 3664 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\mail.exe"C:\mail.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.dywt.com.cn/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef78e46f8,0x7ffef78e4708,0x7ffef78e47183⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:83⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 /prefetch:83⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:13⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:13⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:13⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:13⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:13⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5623379566838029268,17597962517433812345,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3324 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59ca93d221c0de2a8f5fd5e60b2d72370
SHA13d8410db26d1ef13c3cfcb82dcd95119f11c4339
SHA256de33281f4568e0c254fb1e53080858512c500b863287c993bafdbb11bce9516d
SHA5122e1c5e453c84d2cf6e791c4addbb54e5746f4edad05543d53954690ea9322cb7545a78c99bb9c4017ac8c8a0b2abdb2ce86ba350a19e570588dbcf7eca52bbe3
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\97389745-6a2a-4c8c-bee9-ef6e8fd8102c.tmp
Filesize5KB
MD5e57f7286ea8a559f2233bb256d5b73d1
SHA142bfcc862c6fab196790858f88450f974431fe94
SHA256ebb1f0dd20cdf3f5fb9bd80af1b922002dc258a79c395fdbbceccd7788073aa9
SHA512bbc165ecef7dac870028a3a14232b8a885a66acd4eddbb24988298478a544f869ed58a54575a23cb8259825d37094ca340a8bba4ebedfbd5206a4c50b883dda9
-
Filesize
6KB
MD5710fe9e1d1fda9a8e6284d2a151ffc4a
SHA1b28ef14f11b24795a9dc05f8d7c071c8cdeae4c6
SHA25618cb479944273cf3840a47a04359cec91ab64423f9098a0f22b2559dcd73f2f4
SHA512d3a315a085958f1b69bd1de636fa8f4a7e86c8a86b0fb3f9ab631a85f05f37d0f9b07c036d26c1ef1065faf6f2949400beee8961e77d9e55b5b839d852ba62ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f95ec4feeea18b9b68ea3fa836753828
SHA179446fef660bd08df26670d6c1fb3cf1c5c16cca
SHA2568394cdbf683433fca91681064d2eabaf0675432628897fdef6c9ba3cf331d936
SHA51285fa9e613e132afbd7a96b9ac369ea5f355357308513b0ec88682dd24270a7139901f9de4bf1ac723f5493bb4a3b66c3959ca55b1d45fb7d645d6ab6c0648e6b
-
Filesize
4KB
MD58ba5b2b743984c5b8664017878d0091e
SHA1831dc603b792cdc464d7d3f2cff66036a908dfaa
SHA2563b8e6848fcd49a6712660c239f131872a7e35eeed8b6a65ae83afd78f06125e4
SHA512a4a3e3b64c581eacda2b1cf8b220748aad8e0afa0974089f90f04501d2a049b4e96dc0d534caa6cdd2d5257014b7919752fb177fd1626f1e2a6a794be87c96d2
-
Filesize
63KB
MD5797d36d890bd96ef00369a2f4ee00f07
SHA1ece843e8e93f8d8dcfa69961898043391e6cef69
SHA2566c04ae545e15fe257e1cfe374649ad968a643ceb7e3f75a834825530633c30b6
SHA5126064215d00f7bde0a052b5eacd19eb5dd40021d5dc0ead3a816700cb89fdd668445258367c1c24ab9008a53978e84ea0fc0f675582ed5a957bf31cff41c68bb7
-
Filesize
81KB
MD51c289e7de77cb4c20e44f3c47b8262fe
SHA15c29f48e4ccb9cdef10ce0967bb2c519c24d9b8e
SHA2568fbad8f2b32ede1cb633cdb0531ad7bf89e8f03b123dc011231b0ebd2628cde4
SHA512a44538135ac86d96bb12c106fb4be12ac90b1d8f840efc5b43cc7b37a81bb9cfb5796ef841dadff527126c4f53951837321f9f156ff451f20d13ceec0ff68be6