Resubmissions
03-12-2024 23:11
241203-26qqpavlhm 803-12-2024 23:06
241203-23wsjavkel 1003-12-2024 23:04
241203-22cchavjhj 303-12-2024 23:01
241203-2zmepaynds 1003-12-2024 22:58
241203-2x2ftsymgs 3Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 23:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20241007-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 3512 msedge.exe 3512 msedge.exe 392 identity_helper.exe 392 identity_helper.exe 4752 msedge.exe 4752 msedge.exe 1348 msedge.exe 1348 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4676 OpenWith.exe 980 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 776 3512 msedge.exe 82 PID 3512 wrote to memory of 776 3512 msedge.exe 82 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 972 3512 msedge.exe 83 PID 3512 wrote to memory of 5112 3512 msedge.exe 84 PID 3512 wrote to memory of 5112 3512 msedge.exe 84 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85 PID 3512 wrote to memory of 412 3512 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://google.com1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe008a46f8,0x7ffe008a4708,0x7ffe008a47182⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,8184530116804256100,14287045259957399103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:3828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2012
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4676
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD5b275fa8d2d2d768231289d114f48e35f
SHA1bb96003ff86bd9dedbd2976b1916d87ac6402073
SHA2561b36ed5c122ad5b79b8cc8455e434ce481e2c0faab6a82726910e60807f178a1
SHA512d28918346e3fda06cd1e1c5c43d81805b66188a83e8ffcab7c8b19fe695c9ca5e05c7b9808599966df3c4cd81e73728189a131789c94df93c5b2500ce8ec8811
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD58e2c0563d34f734671bb965a71f0903c
SHA1703d779a50d36b0ea29e20d85c6c47aada066b1c
SHA2561fd1e1bee87b164957affe75a26d8a632affdb1b4bc9158d76895ed0037ce7fe
SHA51217a91a7f00a98934c228ce53fb30b8d593eeb479eb8b54708c58ff0a4e12b30e02184516f7bfcaca74e6bd2016df89cb1fb7f286f8fb3a9e8a863fe4c8819209
-
Filesize
956B
MD5ebc0ccb01d8d9bc52fdbaad0b4bc633d
SHA1cad7630b43bde5beb72e7cef06d3b778d7ba48b0
SHA25697caf7561ee7bb28919e27c6d89ba580eb28d55282bebb6d950f03e160862d2e
SHA512471c9cc723fb289baeb963febc0badda1da8e0b06917aa2cc8115f2a2334c4eadffd3dd7803a2b9119da0357b83dc99ef0eb2e7bee0231b37b525f9df7af309b
-
Filesize
7KB
MD5cad2f82219346f319d303dfa9c1f1139
SHA196f9c907f688e2d115af8e999bcbd933a237ee4e
SHA2561f47fd67c234701af91ce01c3558eaff30a4d99af51f3c556e0398ba09eaf8b2
SHA5124547af22302c242fb3d07e2907a98c5f589c23d12a44e0b3c5aac2c7147b17b61feb92925e4c35f8df49f4c0d1f75d8aa6bdd55c597ea9a29980c4c3b18d16d2
-
Filesize
7KB
MD50d95d39632603f85d7ff0dfbb50eeae0
SHA192411fccb6dbf1be027b2e5bdf7e3134ec23ea41
SHA256ac2d5d722797c84f0ed92ede2d688625abe1a1882c08ac84533c3b2d67b8efbf
SHA5125d3c1f29c30ee2050d02062346c7e1e5d578a5bc3e9af1fe187e869c9926baeb3b3a23fa24dc09f69dc3e886a507b041a1c37c124e650c457f0c4097f581f166
-
Filesize
5KB
MD541ca4f17d58ae17a33feb2eda89fdb01
SHA1d7927c35cef32e270ac9d3e93f9f1265f80dee62
SHA256a75b7d5e41490f6d2f9acd03273b0daf207d51c75558d7fa69ada541e2cff714
SHA512b522e141faac07c299fb9d83ffd5dcb6fbfec26e1aa1271e4d372a5803b303251b4a312d5af380c7d133290b743ebd74448f442c3b23295c90eb9ac2ba5bc952
-
Filesize
7KB
MD5da9204d28e1b1cd1d6833dfdfee2c660
SHA180f4c67af42b120c904dee1d446843bc67e15a71
SHA2565f4d1b23cee1d188bb3bbb88f0f6e61f7dadf4f47e022083065c1bf8a0f3bd0c
SHA51225a19f1de7205659c17e0b10e8fdacefc7e49fae90508e1b3fb51bc0b3e7ae744f359d36d465ddbd3faf94cf8a78eeecc90eee45e5e04b7bf0248f292faa1277
-
Filesize
1KB
MD5a51f508011c184c7e9fde6b7beb5329b
SHA1cd633944c8fede05dcd00731294dccb45d87adab
SHA256308824e78c73ef9d9fc5a60c73097f1d4fbc40036e82ce720fec46c915070b92
SHA512420bb83e0eb33feb78ce4ed8b0251838d9b85638aef18a569048397a2f8e0f14f1ff9b89f806e2b2ba8e0dce2d0ba2c3ae1d09e8f20a89bf017595b721c6b380
-
Filesize
1KB
MD56c1a38429f921c2ea4e23b3f1456ebeb
SHA1a002b444ad73154027c5e28693c4f7318eeba3ad
SHA2569477e15d5fe24662c393d325e862c09fd249e5ce2951e490961963a379bfac22
SHA51236a5065d9582809a2d5c844402db4da6c4804b3fb1a26821273a6f4908e768b22448d8875a7bdaa8a66bc8cb2e12adf79b0fbdb36bf7f998ae8a42de41a3a92b
-
Filesize
1KB
MD5039f8dcb73f6db0f3bde46239b83be02
SHA16701a27449718d56abb0478343e6362b04c0813a
SHA2567fe1cce0da1fea54c63d5d0894476c625f23f9b167fc250bc11a45c44c5963d5
SHA512f56ffb9c1b04f26a96f15752bfa219e0fc754501a88f96545d70763de19fbeffba0b0d9ac98940873892553aa7ac516f865074199eceefa1a450f68aef8ad351
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a90f1242dcddabff6bf40a8854508b4a
SHA12d627268bbcbf85afc24d94529e50904b719e830
SHA2563a3641d46605c7869044160ad5d56bd5918f0b385f0bfcf32e2032d84b022905
SHA512cb8bc67e25854ed1ea29a750c28e3d8b1c6a777b28485720d7e923e106cdae6a1dd1670ac6f228deecf94d01ab88cf69d4526c7c64d5bfb40493b1ec718575fd
-
Filesize
11KB
MD5781d944ebb33afd1e29e0535d6d5b641
SHA14eac8b24b69454a115d940a993b53bf5e1550fe4
SHA2560e2fc4658802377c7dcd62426bcf55a60ee52b5773fea7337f96b8095fa00827
SHA512135250f6d6c3cbfc40a635cf9632d7250c15dc1bd9fd8e007e3cabe3639cd9fe5d3213afb1fe954a65a3182810e6fd4fdaaa5a50b0d6fa2d247e857e064906d0
-
Filesize
10KB
MD50afc8c1c108907078c71c0eb1182b4ec
SHA1f900817eec9122eacab9612dc54f9e6844b40ed9
SHA2569980e151af4a94222ecd20c10cffaa0f588247ade742b61a7b427bd6715c43c9
SHA5127dff820a6cfafe8b12d72198024aefe693a05c1421d8c55d012918e40c8668e5d7dea4a6c703ab75723b47dd56057491b2a61180a1eb812fb8fab0deef2f7dba
-
Filesize
53KB
MD599190e3a6848755c06ea966b7fe60695
SHA116b2d6d2a515da07c700cf34255482f973971522
SHA256b9c352e7cef7e3725b405ee7cc47dfca83562c221af75574d7bd3155f3a455b4
SHA512d81f748e76bd46d7a29332bd4b6b7bc91e96edd7a711faa1e819ac9d7cc93506b278dcca67ea97726abd5d45fafe1ccbe7a0809bb39445bf006dbf12a937f08c