Analysis
-
max time kernel
237s -
max time network
238s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240903-en
General
-
Target
file.html
-
Size
8KB
-
MD5
b24e8ce81ecb235932bd058ee9b96845
-
SHA1
b0edfd7533c97b2cc17ba26e322d95c15ca07756
-
SHA256
31010cfdcbf084851f8bca16e6c16803d51ed69aa9ca91a63de4ad2dcb5827fe
-
SHA512
ab819d84daf1205990a88ea82b8fb5dd94f099d2fe9bea8eb6698045a739f165580fd2863659f5c5d0f8f727cf8fb95f6c1abee4359dbe1b49fad074a6deed51
-
SSDEEP
96:PNybXaotqEb0EZ2W87IuU5N2INgKvclXtbF8Y58Z9HaeK1gF+nTvkUI5SCKlWkq1:PN2x2Be+/Xtv5qX9WIUI5pNeWvik/yqN
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
Extracted
lumma
https://occupy-blushi.sbs/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Lumma family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
loader.exeloader.exeloader.exedescription pid Process procid_target PID 1816 set thread context of 3880 1816 loader.exe 144 PID 2696 set thread context of 2404 2696 loader.exe 148 PID 1892 set thread context of 4556 1892 loader.exe 152 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
loader.exeloader.exeloader.exeloader.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid Process 2892 msedge.exe 2892 msedge.exe 392 msedge.exe 392 msedge.exe 2776 identity_helper.exe 2776 identity_helper.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
Processes:
msedge.exepid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exepid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 392 wrote to memory of 4324 392 msedge.exe 83 PID 392 wrote to memory of 4324 392 msedge.exe 83 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 1032 392 msedge.exe 84 PID 392 wrote to memory of 2892 392 msedge.exe 85 PID 392 wrote to memory of 2892 392 msedge.exe 85 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86 PID 392 wrote to memory of 3112 392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff963ee46f8,0x7ff963ee4708,0x7ff963ee47182⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,3107654457407857303,11931248279778308713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:652
-
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"2⤵PID:3732
-
-
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"2⤵PID:3176
-
-
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"1⤵
- Suspicious use of SetThreadContext
PID:2696 -
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"1⤵
- Suspicious use of SetThreadContext
PID:1892 -
C:\Users\Admin\Downloads\loader\loader\loader.exe"C:\Users\Admin\Downloads\loader\loader\loader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5937e26e5151db1623ec6a797162bb4e7
SHA1b5c3456ce0e46aeb8f26fb7cf0411600d0975fec
SHA256102806e7cf34aac6011d375849df89868e8178d43cbd086529ecb55f5af82cb3
SHA51208515dc5b75383ee18790428ff664b2c2a433e5dd44c01348e2a24e3da949ccf504ccfd09b1dfc6f0620d2dd2c1a67c88289ff28942e00fa7df798c8d3babaaf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD53db3802740b6c59064e4297a48902c13
SHA16b16add02f94d985b9d240ec8b4272761cc0486b
SHA256fdc20550d7a9f7ee4f74709bcbf82115d60363123e28a582322aecfd313c077d
SHA5128c167a4b0492052b7737ae8c1dccab82c3613bbc1e936b8668465801dbbc21ebcd44fd6754fcaa00e218fb97e3006b2a49bc2495d2bf331a1314c7fc6a145f2f
-
Filesize
471B
MD57f92afc601835c71f2052e53f28c2d94
SHA1afe35268b4fe19510f32829ba71afa0d71fa9aab
SHA2563a3498d168dbc13d0fbbe791bcdc88877a9d3b77d41679a7377518360c0cf0d7
SHA51268b90d5a31fe520ae00f44cd7b6f989ff3637cae3e2b308f5cd6e9b90a71b3a16f155074e3c8e6bff50c30f2c3af52554ecf48640d30ede7be8933dc9e702392
-
Filesize
2KB
MD5dfc6704ac8012eb069734e3457990b21
SHA103bb7c9fcaa950e157904cae9c7c27f60afcbcb6
SHA25661c6790b762368b68098cc7478f53380b0308d32c1a105c3f5fa37ab5b1b023a
SHA51261388172bb0bc69be82aafe564f55e350a6bc8e25285737766e078588e674b781f2e174f8a50fa937b53b7798f83aa0662c73b7c6d7300472fd3ec0b874a3131
-
Filesize
2KB
MD5f00608ad1aaf102bab84182d30017815
SHA184331862a386153177b9438280a6c928d0505ac6
SHA256fe63d0bbfbf69893601ee24742177cd7e48a53becbb936cca6ce236bed777d12
SHA5122e000dd23dca2eccc1961b55a39ccfc07ccd60787dc85dff33fe2c535c6f98f9c5df817ce6ba4b159ed6526c8a06eb85d06e07bcda5afb4754268d3430a7923c
-
Filesize
6KB
MD56ab7a7e9eeb773391afc9c0f430b347a
SHA14111cd04c059fa77a36a353e13df14d9bf70569d
SHA256007bdf35ab761b2a56dc0fb7422627ce6742ab5a230852685dd74a50dcdbe753
SHA512a033d65217617b26814835af72a99f755e8b7906f955e8c431baabd6d9c96875b7ab0496251d53e976a87afd8751e91285a0bf424e8494d71c623ecb4ba27ff8
-
Filesize
8KB
MD5ce7f4973b5f0b17f0e1270d0b70d1ed0
SHA15e01a68d8e095cd30a375d98b9fb921bb0199efc
SHA2561944fdae84c811720df40c29e6407b312966e72c5bdbb191b0d87c3895b42708
SHA512044d050c14c60ec83e5ca8ba0525c896cd4fa3a9f6c0cac76a2c246e486ada72f8a9ad1b6df67b3af38bc2e0840dac802021bfa4cec6dc6e278585508bbc5034
-
Filesize
5KB
MD56ac2f2be2d8bd66cde9e666ef72d0aec
SHA1206d0d95a18c8d65050fb54cc3fa499b005db546
SHA2569c82c0707d778fc1ead11dd8d4a3b70c0fd7de728ff990ae80e9633a08506939
SHA51202ffeb4114259384226d92fc9b625b208e569c2a0a9efdfd76342a6db78faddc68eaa10f36c72e28fd8c28cbd46b65cd8da25164cc05acb0be49276305f06f41
-
Filesize
6KB
MD55f0693a983f6e123a4b293e116578c08
SHA186d20740925cbe227d56b54c44b1f2a0cfa0222f
SHA25660fe9899a673332413ab29f9e20112a99fa20b7e5a104e4380bd45486ab6ab70
SHA5125167077fcf33d6c20e7b95a03c60f5589a8ae8b8db2e4e80fad603cef59cca7c67c53741abd04e37210323a2c7152596018be932548854096f9da70df4f761da
-
Filesize
1KB
MD584e766371c8a6d12234ef46afbb041be
SHA15025a9563651bc68b2fe4647c2c24de0d7d1564b
SHA256d9a72666f87a763ef531bf9b764305a5304f5ffde15f9e0dae6b3c736596d17d
SHA512466cff3da7a2631a28a09dc00a3617c53fd4001e142da3089715bdb966f43523e3377b0697acebb76fd046f4c3bfdcae61f136b46c4e15e7715b2dee1a9139e9
-
Filesize
538B
MD577f4191584523ce945a2b2565844d34c
SHA13a5c2a2d899cded0de41d242783e32cb9d798b36
SHA256039220edbba0a22942b93f88715a699fc68a3d671a28577468b20d74f60ee72e
SHA5121b7e2a0ce51b41824bedcc44632aa0e059d560c365072f2389ebac9b2e9464f48a90db60404eb7650f9261153483302e537536a686227eca0e30c880c08c4c55
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\de5a1d75-3859-45c4-aeca-1de61ffe404b.tmp
Filesize6KB
MD558ffc05a23d256dedb4b484e50b98048
SHA13f79f08d2dc30fce110f2c1cfa26ba0defe9ee2d
SHA256863ebb1e9d9f675bc6f6109b879c81348f5bc13b4098249857dae5a5c78c6768
SHA512d6ec1ab8ab3417f65c60ad4be5fff3ca3290d483887470ddca02e09a1757b3ac2f7898eaaa20dbc55a1dd4451782084fa6d027c4ddd1ce2e0018a720b6e8ee45
-
Filesize
10KB
MD583544cea357428ec9514e8e9394f75e6
SHA15fe780da0e08353a23a587d76cd298504a1a88e8
SHA256069f263ad4d00b0bd80c402d07397b44affc541c713d97520c73c114a84f47eb
SHA512cf0af7dd566ad25f1f3de12c3c42db1fcf63c57db04ee0467b5c681d91dc81d08b82d6490fc57fc36dfeda565eb81d3546a1180b6ec2b899aa3118337fc177f9
-
Filesize
11KB
MD5de7e3daab970fd9779aa1e14fd0ca8f5
SHA157cfff7cf27d4f16fa2f77de16298e025a3cee72
SHA256f18b01f09e360d85eab47b215c13c3089e6783956bdbd0f5aa27fe7965c0e51a
SHA512c28c51bed7837406f9c65d48dc84c9bafdc4ca8633043f9093b343d94ddd35fb01ec4565f73a33cc45b15dad0aab0ac5d57e5c3e80ce9bb9e1ddfd3361d3ef4b
-
Filesize
34.5MB
MD55a9085c34763b4155b1be71201cced64
SHA1e981d56520e8e02e05a21897e2446cce92d24b72
SHA256f14ca22eb2f1934ffc388845146208b0654e8996afa7e7f2a2c178bf7dd20d6c
SHA512516331c7a748ef7447ab7553abbf4a1db022fdf85601ffe5f837f74c180f1016ac5230a7a9dda64990221d369ddee5b7fa25e16393e443abd7a79f52de2261c4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e