Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe
Resource
win7-20240708-en
General
-
Target
53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe
-
Size
6.1MB
-
MD5
5a84f364482853c29047580452aefb80
-
SHA1
64ae21b3bf0f20bd348182b6d256dddeefcb374f
-
SHA256
53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315
-
SHA512
1483f579fd50619398d746f1aaa9a87004f143fdf635c319223db23d7fb2bcf7d3fe22f4b9331ccb2068ae605ae60146086dfa8020c4c131052f2bc72a0fda3d
-
SSDEEP
98304:t0oOwohXs3/bXZLM89E2l7642vkJvQnV1ydJTTjAOooSjMWhso9ZPQEGhLljcgmf:trD9Jl6s4V4dJbAKSlxZkNljcgmRdP
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b1d-1.dat floxif -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\Drivers\etc\hosts DllFixerPortable.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b1d-1.dat acprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate DLLFixer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DLLFixer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe -
Executes dropped EXE 2 IoCs
pid Process 3528 DllFixerPortable.exe 1088 DLLFixer.exe -
Loads dropped DLL 16 IoCs
pid Process 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 3528 DllFixerPortable.exe 3528 DllFixerPortable.exe 3528 DllFixerPortable.exe 3528 DllFixerPortable.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 3528 DllFixerPortable.exe 3528 DllFixerPortable.exe 1088 DLLFixer.exe 1088 DLLFixer.exe 1088 DLLFixer.exe 1088 DLLFixer.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe -
resource yara_rule behavioral2/files/0x000c000000023b1d-1.dat upx behavioral2/memory/4032-2-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4032-294-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4032-385-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4032-410-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4032-436-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4032-441-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4032-506-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll.tmp 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe File created \??\c:\program files\common files\system\symsrv.dll.000 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe File created C:\Program Files\Common Files\System\symsrv.dll 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllFixerPortable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLLFixer.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023bbf-112.dat nsis_installer_1 behavioral2/files/0x0009000000023bbf-112.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B9FB8EA-6414-C02A-1FA0-E5A0E3ECE118}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" DLLFixer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B9FB8EA-6414-C02A-1FA0-E5A0E3ECE118}\InProcServer32\ThreadingModel = "Apartment" DLLFixer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B9FB8EA-6414-C02A-1FA0-E5A0E3ECE118} DLLFixer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B9FB8EA-6414-C02A-1FA0-E5A0E3ECE118}\ = "Undo Command" DLLFixer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B9FB8EA-6414-C02A-1FA0-E5A0E3ECE118}\InProcServer32 DLLFixer.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4520 regedit.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3528 DllFixerPortable.exe 3528 DllFixerPortable.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4528 msedge.exe 4528 msedge.exe 1876 msedge.exe 1876 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe Token: 33 1088 DLLFixer.exe Token: SeIncBasePriorityPrivilege 1088 DLLFixer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3528 DllFixerPortable.exe 1088 DLLFixer.exe 1088 DLLFixer.exe 1088 DLLFixer.exe 1088 DLLFixer.exe 1088 DLLFixer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 3528 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 83 PID 4032 wrote to memory of 3528 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 83 PID 4032 wrote to memory of 3528 4032 53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe 83 PID 3528 wrote to memory of 4520 3528 DllFixerPortable.exe 85 PID 3528 wrote to memory of 4520 3528 DllFixerPortable.exe 85 PID 3528 wrote to memory of 4520 3528 DllFixerPortable.exe 85 PID 3528 wrote to memory of 1876 3528 DllFixerPortable.exe 86 PID 3528 wrote to memory of 1876 3528 DllFixerPortable.exe 86 PID 1876 wrote to memory of 4680 1876 msedge.exe 87 PID 1876 wrote to memory of 4680 1876 msedge.exe 87 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 512 1876 msedge.exe 89 PID 1876 wrote to memory of 4528 1876 msedge.exe 90 PID 1876 wrote to memory of 4528 1876 msedge.exe 90 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91 PID 1876 wrote to memory of 3664 1876 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe"C:\Users\Admin\AppData\Local\Temp\53e33e85ba0c94c616283fe2f88b6bf085ed5c20bb3460aa15e6ccf0bf83c315N.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DllFixerPortable.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\DllFixerPortable.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\SYSTEM32\regedit.exe /s "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\DllFixer.reg"3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://avxhome.se/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc739846f8,0x7ffc73984708,0x7ffc739847184⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:84⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:14⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:14⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:14⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:84⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:14⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:14⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:14⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13063857040720190730,1649208933466042659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:14⤵PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\App\Dll-Files.com Fixer\DLLFixer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\App\Dll-Files.com Fixer\DLLFixer.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD516cc44da55879e56734b6440a964292f
SHA18f60cd7662b481b044d77c342b558c54de8bdf48
SHA2562069fef9a4ecce8f1f61871edd8623c5dbeefb336a0aefd2511e2f5a85a80030
SHA51279b5168dc1c06d1bc19ea157dc1249a3740e13604151ff7652fbd6f799d582029a97c3e1139cf9d9c6816769aae9adcb3ebbad5b2e91464bd1f5220778e56245
-
Filesize
589KB
MD5ba444ce89e51032b8d7c8e55c80f5fb8
SHA1b0b540de38a9e6acebc6e86726a51c5dd99c5865
SHA2561fddbe5f455e59aa44b6d858a7d5cd1b38e2c12cccd761a19fc5ebf934cff0fc
SHA512f0b844e400ecb5e2fd6beb4fbdf10d8a2ea45328062024d70647f97da0fb8c39012ea4bae875bab8adb2116583e5ed58cb4494aabb61e21caca08dbc274f07d8
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
175B
MD51130c911bf5db4b8f7cf9b6f4b457623
SHA148e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA51294e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD58a8b58ef0ea6f75946c4d69fcba0c7ae
SHA1474af3e213a649987d7860f1b37c2331c40404dc
SHA2569892805d1481792419267976da403f0bb1373c209185b1eeeddb598055056865
SHA512113aa0109c1f9caf9680e476e85a9cb410f9b7aa9ba6914209458192de8a092d89363e620b028dde6884a1e1f2b09cf413ad9da8193f0b77864bd92567e660d8
-
Filesize
1KB
MD53e1311583f98ce6c0f4e9fd2a3cdc3b9
SHA16a47cf91245ab8e190041224437e01ff9ea45794
SHA256bb3d8a2ce911e4b9d5613cf5025cd41e513e22ebe7b0a01bf9c0d08237a49eb6
SHA51294088b9f06f5d59cf2caf365e263d37747dd7779a6eed1621ff343ed3c8fa17fd1da4892c62abcee30304416ce8febd6b21449b0e095e36168fb24cac2dc8998
-
Filesize
5KB
MD5f443375badcab338153b4e00dfcffd3e
SHA16ab9a4e907f0abee98c74875f3f5a103b9b9c64a
SHA256f2bc0670e338d2da45addced51135a0ba55e7fb627692c07853ed42a362d013a
SHA512efc8183ff9a047c42d74751ba2cee7627d0c2def1b128c7a05c5ab5bae3e1addb1a03d80b2ecc5c7f2bc060f5fc30c6115a95e7540fc751cacd2ca9e63390c83
-
Filesize
6KB
MD571c6aad504568f5261714881041feead
SHA1e35eb8c2c7e6e5687e7abdb6b856442d3aed168a
SHA25696345988a38a4d1c07b68a74d5406357c2a57582e78258bc0a68d996160b05e3
SHA512bfab646daed2604f15dfe1f8a1b88de07983f4454ab1af7a940b8715601c3f95707d759392618968ac50d50e43650353644563fe4a2f969c95278812abbdfff2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dcfe33b0e1c5275fdbb9c8683b3eaad2
SHA17f4ede6cc1bb04a9ad7db24a6ba3ab143697b6c5
SHA256a3c18e271d184719e1383ed9896769a9618fe51d87a43282bc9a64ffa05af25c
SHA512d0c6dab176c80052b728b44ed2bd1a804b6ae5f5f65a8193215be49573386333de1f951927116ffd9c4b1df85f4fe68791f209d5e2e1d3628f5f3330965dd5d0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\App\DefaultData\Roaming\dll-files.com\Fixer\Version 1.0\TempHLList.rcp
Filesize6B
MD57319468847d7b1aee40dbf5dd963c999
SHA17722745105e9e02e8f1aaf17f7b3aac5c56cd805
SHA256b0f66adc83641586656866813fd9dd0b8ebb63796075661ba45d1aa8089e1d44
SHA512c11d53b386f5ee0c042c9246d4a38b1e032a3bc9ea3f6827a9482d4f31b6e4a1973c97190bdc59d961d5b6f1d5b06c25c4b9e94ca04eaef395a928fa851493d6
-
Filesize
10.0MB
MD5623ebf8ce787ba94ee7e3dd3a2115372
SHA177c8c99a345d4ee8a8e700bfab05f87986633f59
SHA25611f95ff48ebd0259d36ae56628439e21f775edaffe68a215e6959c043bdeb2bb
SHA512b498675ea9daab67d964026f8442028ecc7686f6bbda79e1dd63f175a472eae9aeded9d0d57289568cf59a01cfa8288a91e74eb9451f72e69905fabf731ec7ca
-
Filesize
2.9MB
MD5cbac13aeec0b8c35bcd8be3f815cd7e8
SHA139f4f1c12a50fb9fc2a2782627eb0396426d8982
SHA25678ca94130c9463175dc1dd427aabf1be57ebb75c221208401fd78ea595d3040e
SHA5125729727975b5e0136cc859596b9e8a7393236e083e84a0a88b1650f3588b44ca41cde046ff18bf065159a4c964c15b41d73441d9cb9fa9162ebab4e4a58eec77
-
Filesize
200KB
MD53297ad16c1636c1a55ca77490e304fa0
SHA18a5a335c63cb904287c156845d3e7d3dc5bdfb9c
SHA2560033cdda4b80580259464d52eecb0d0113d2851ef6555f409f44363ccae7f595
SHA512971a25a0ac8b8369ed0cfa5e931fba0acd890fd8bc0f0604a165da837a425e376cdd669469c851e2f49bb91e71868b80ccb808d50fb567dd8a2688a2fce0bc97
-
Filesize
96KB
MD5edb38b19512c080c36256e67e0875aff
SHA1c8732d10c6a55a6bc6780d6fc6172b4a9d7a7ec3
SHA256175e1dbfca76083abfe0b342fb508a77f0b51e54b27ea71124c9bd4240d3fd13
SHA5129e0e32d9fc0d850dcb3dcc1eef0ba4ef8caebd99edd6962dca1e95b849d5f625e986b9afb9500a871d77ba608c953a360c66e669c391458da8beefa7c5b31cf3
-
Filesize
154KB
MD58192b56014894e7869374fd3b042e386
SHA18ce1b841723726b2d7f7d0435b4b9b758636f3b4
SHA256a0ad24d6c6a606200fd2c295c74e551a84cf7282909b6db463fbc022a5202dbc
SHA512d5e5369d7f0c6c454eb0360ac5025470f56b5f9688ae474cda8df2ff52aa10646cba0413e33023c2194d4d351b140ee8a0ae120acf24a203901ded3c301834ee
-
Filesize
124KB
MD571a2dca8f626fcef8bff7e2c17c67a7f
SHA15aaea93ec3f4d722d7ea0c2d86bc4f3cbdce5c92
SHA256b55a978443ef0b873875910283bedfab0c3133bac7be72a68ed5146f83f1ef8c
SHA5125244918679eba6e7af8e367c66c3d1bdcfa2323400994ecda37ccd697fb28b52ffdad992650929ec98b98ae9e0213074368a8881c6a62e48579c30f17051a17d
-
Filesize
1KB
MD57509b7c4d13f7dce4cfdd389142cfb9f
SHA172d78c2d470a2101b74d07d9418d7b6c15db3149
SHA256e9530d9998bbc8a08936751c09c56bc10c8eb35b54305261b5a310139fdb983d
SHA512bdfd1d084dc70673f30d0424ffc298c2fae33f4e0de5fb1f372d7d60ba2f81f43434abc391645ba22649be7fdea78c5929e2c6489765077aeea9e492de3a529f
-
Filesize
190B
MD52694db1d7a4da30651a8c33063861ac2
SHA1bb6620e930028c6368e5b320ea0040e6a4c454df
SHA256438aeb00e5e9c87d01f36aad7827a8998e15996e541282b7c1ffc3e4a10e5769
SHA512e74b848aeade5774481c23693ac044c48d7ceec33506b5bedada8cb792125617e89bc394008b77802ab6fc8a2717ad71d94819601e7b2f0739fa8b8b1a89730e
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\Roaming\dll-files.com\Fixer\Version 1.0\Partial Backups\00000001.rmx
Filesize128B
MD58b41e67828d2343381c9cc05984ce281
SHA1057acd8edce29b029b3f32693e5a7af8b6009c7d
SHA256412ab4572330ca6ae0a63941d1e23c62407c34a2980a666e5b8c135f09a470b2
SHA512e7cc90d90a8fe45cad0377879328b30e6cedd96e59afcd03b970d46475859f195870bf62033575aae4eb358d48343586f1f11c9214a590bb8816dc47983c7a3f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\Roaming\dll-files.com\Fixer\Version 1.0\Partial Backups\00000001.rxb
Filesize16KB
MD504810653aff82653429ba39cc81bd6c9
SHA1e4b8276983648256ee71bcd749a9754f2070a0aa
SHA2568bd083d106e9e71f2bcb842a35ec272c3eb4d8b6b11e8334ebc095316a97d0ff
SHA51215b4cbe9dee3ff0f727b2a145541687eada1da8cec474e53b40590b18181a423af7325650bd5984bdbf52763330291d0eea4511119e135f2b73b5af44f488545
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\Roaming\dll-files.com\Fixer\Version 1.0\TempHLList.rcp
Filesize782B
MD55c115f3bd1ca09744ec80e7ae153cc0b
SHA1874ccaf89dfe2c247b38bab5bca80c20c250fe78
SHA25666d32470060b61ec017cc076ce84eff93d93af7e41fec7fd6faa615ac007b90f
SHA512e66cbdb4f566f2b69db1c8242c21dacdf96cb5e6c5a93de0aeb0736e4f91c30577d59ab46f25f3fc282dde784f89d30d469e26703c59df92ba3cf5ead03879c0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\Roaming\dll-files.com\Fixer\Version 1.0\laststatus.lic
Filesize419B
MD5db08d162908130741305e9dbd9046c97
SHA1a48f5486720064f297f12c3ab5c549aa355fcc44
SHA256fab24d95d1ccdf8552ee02c7296d056c9b78319379d5fe9ae871c9de875adacc
SHA512b2887a8bc38e88e03090a446c522aeb05bca9034dc669ef65f3a191871543728af4636d16d2411d21ff33c353633f224676a9efdd6610d77939a4412a39ec24d
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\Roaming\dll-files.com\Fixer\Version 1.0\log_06-13-2017.log
Filesize223KB
MD5c0617dad5451bbdc9f6a97e55bd4b861
SHA1d562dd269388bab10e8457b3a22a82e91de16003
SHA256918ef360fb6c3aa1737ddc8cbc1c69e4cc663dee59c2fcb70a28742b3d10a2fb
SHA51276533b87523803f2e314a4c43c50ea16314ba9aec910bae547973d69ef9503f293b1e4d2d24a06ea6577817755d8017df80a6f6e4345975ad13ba206ddf785f1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data\Roaming\dll-files.com\Fixer\Version 1.0\log_07-09-2015.log
Filesize440B
MD529982721715d3cb6c495efdf2de3d490
SHA1d8853c66e5f3d23e1960d9237a7f1a7782db16d9
SHA2567f487616e521ed9b0a6245ef7c27e5def54bb6254b753b2eeaca8f3d272ce557
SHA512c0aa2aecb18537ed3456608da74213faeea892d56107940aebc94828e5afdf5f7243418469631d2d5d5e8d113d41a81320c7181ebfc9d00cfca94232168e3e9e
-
Filesize
397B
MD5b4fb5b11b409495bf76f2e7764986a75
SHA148f7606ec78b4138e1f493911f302ae6bfe4e81e
SHA256bb862416bc2c3b0858eaedac13290def75fc9b0fcfb0925c6b5c916894854a7e
SHA51243e82ba62d3acb16039d1a119e7c911c237f3fbc7ea5b1c568f2f23294760eb1cd07b8d9ca842cfb123685cf637fe4c4c9a2fa03948b5f782812561ae3dfd75d
-
Filesize
517KB
MD5f363d40faaa31fa4af15262ff5e60bdd
SHA146c826bd456a536d946a21db6d7351ff5afc1d9f
SHA256cbc4fb6f6576908c152b3687a1e2ff7793e837dff89cf561124ffabde7814a14
SHA512601d6cae4ae347cafe2850873d09350e2a48935956cebd776bd1b74ad1dc0b55b41dcdcb04273b0eb6ccb6337dd2c46e88bf71b1efc278afab9db15aa2da1daf
-
Filesize
107B
MD59c999a4d95dcf6e82bebae5882dfa95b
SHA1c3a529ab0dfc68b2f1d4fa82867cf28b1ef3fc09
SHA2561289c76030eb9e04cb2b2363ae66cefd1b2af957ce1bf7d04d835408690a8e93
SHA512fed8f935e6930149d1e22dfa9abc32e3723a59218c7a0c399b03256338bcc82360a840a218855cb66a7c34aa4f35d147eacb86595e31980c6f1bbf163b0c6342
-
Filesize
3KB
MD575e7351a0f836b8659e6f315683c29f7
SHA166b733d1c978d68cadc245e7efbfcae32807429d
SHA2567ffc549e7f679a08c77fa230654b77cdffb3444296bb7c6b8b5769db374b61ee
SHA512f03400798b07ccca5e12fa119a586ee9444deb0d2419aced24d93fd84a4702d66864a71b40a11b04b1dbe56e36481cd6a644aec0347bc82bc7375b27bc403fe4
-
Filesize
24KB
MD52b7007ed0262ca02ef69d8990815cbeb
SHA12eabe4f755213666dbbbde024a5235ddde02b47f
SHA2560b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d
SHA512aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca
-
Filesize
100KB
MD5727906f8e9c58e4155bada80d2a6e44a
SHA16b6cbb007337004d3dc752d7dfab5c692e3a00cf
SHA25614d6d0abbe4ce1bec5ff80b373ce3a8944c17761c732dba04e434ae2b6024642
SHA51243aee5fd4acdf24855dcce0d9d2c8ea281fe81e2e4229c98d2a37699e86e418dbfc21b254bb3d72b7c376a2ff445fc6450e14b16dd34f6672f1de20ea603a256
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
6KB
MD5ac128600d13ee0cf7aa38f4fce82a53f
SHA1eafda641d8f1acc0eb7fc83ed0bdc68df226d85d
SHA256192f9aed83c1130b1b5d302eeaece7d89eaf88d74d7077d61d01d02e0ba7c988
SHA512671cc196d2e73524f9965bbba158b347e50f97fb45ca376e96dd50cfd073977dcbe2918b672fa421bf0f3aac0fe8d670f6352ff0c8d7f1a603657e65b957aabf
-
Filesize
246B
MD57c07fb418c90bd39e47886894b3ef592
SHA1d4bb5c296349ff476a39b1cf43d9b7ff4c36ff2c
SHA2566275eb3f133d798e748229518aa20b8eb489561ad3cc93ff286750711211686f
SHA5127f9d63d74e5f34065ead02d3b7dd4b3539fa8e6e071d23004744cd12ab411e130e78a3f068091310f7f82e932a86ce7b6d6c1f948e3f0ba82f9340ce010aff4b
-
Filesize
60B
MD5a302a771ee0e3127b8950f0a67d17e49
SHA1fb3d8fb74570a077e332993f7d3d27603501b987
SHA2565dcc1b5872dd9ff1c234501f1fefda01f664164e1583c3e1bb3dbea47588ab31
SHA5120a2cbdc97d1b676a5842dca27a58404af4ac09ce8bf0d4ee3c356082ca7ee203642b1502910fd30afbcbb1eaa4264cc8eff73f1350806a2b82660e3b1e4cb02c
-
Filesize
260B
MD59a9b492d91e00ee8451e6b8aa3aede17
SHA1150a9285cbf9385d92eab98ef10deb9503cebfd2
SHA25653adf1195fd1beebc770f22a685233d0aac280e6426d5493275de9b8b7dcde96
SHA51297d9a6e3d4c2a91799c4bfe1a42e2a0513018045984bc994e348b345d3dc755d567b63e717cec2a29bd8296d014fc6e3024676d65603e31e75d606f973d3a92d