Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe
Resource
win7-20240903-en
General
-
Target
2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe
-
Size
14.4MB
-
MD5
7394131db0517873d7b3a88c634cf321
-
SHA1
0ba8e47cb1f98a1b3868c85f3e8c8b03b03186d7
-
SHA256
1fcd5d9317b5c6945085d314257e537583200e9a15227a513682337d5722655e
-
SHA512
efc1d71113f1a16d2c42adcff2c08e7d3b0b352df1e3b77571ec83f12ae5bd0616f0cae3621a676e8442c3dc39489065d0ac9f5ce30888095d7146ff2fce6b1e
-
SSDEEP
98304:8TstQIZETGdOfW0+bs0ZmjBjcaw2lsuze/iBXsLVMZHvOyGCPvPZsDByQNdXCd0I:8It30t0u/Zk2OXCd0LWkVgeXS7
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b91-1.dat floxif -
A potential corporate email address has been identified in the URL: [email protected]
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b91-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
resource yara_rule behavioral2/files/0x000c000000023b91-1.dat upx behavioral2/memory/776-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/776-51-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/776-80-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe File created \??\c:\program files\common files\system\symsrv.dll.000 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Toast.gom = "11000" 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F\Blob = 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 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F\Blob = 19000000010000001000000014d4b19434670e6dc091d154abb20edc030000000100000014000000925a8f8d2c6d04e0665f596aff22d863e8256f3f7e00000001000000080000000080c82b6886d7017f000000010000000c000000300a06082b060105050703031d000000010000001000000052135310639a10f77f886b229b9f7afc1400000001000000140000009c5f00dfaa01d7302b3888a2b86d4a9cf2119183620000000100000020000000568d6905a2c88708a4b3025190edcfedb1974a606a13c6e5290fcb2ae63edab553000000010000002500000030233021060b6086480186fd6e0107180330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080b000000010000006200000041006d0061007a006f006e00200053006500720076006900630065007300200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790020002d002d0020004700320000000f00000001000000200000001504593902ec8a0bab29f03bf35c3058b5fd1807a74dab92cb61ed4a9908afa42000000001000000f3030000308203ef308202d7a003020102020100300d06092a864886f70d01010b0500308198310b30090603550406130255533110300e060355040813074172697a6f6e61311330110603550407130a53636f74747364616c6531253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e313b303906035504031332537461726669656c6420536572766963657320526f6f7420436572746966696361746520417574686f72697479202d204732301e170d3039303930313030303030305a170d3337313233313233353935395a308198310b30090603550406130255533110300e060355040813074172697a6f6e61311330110603550407130a53636f74747364616c6531253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e313b303906035504031332537461726669656c6420536572766963657320526f6f7420436572746966696361746520417574686f72697479202d20473230820122300d06092a864886f70d01010105000382010f003082010a0282010100d50c3ac42af94ee2f5be19975f8e8853b11f3fcbcf9f20136d293ac80f7d3cf76b763863d93660a89b5e5c0080b22f597ff687f9254386e7691b529a90e171e3d82d0d4e6ff6c849d9b6f31a56ae2bb67414ebcffb26e31aba1d962e6a3b5894894756ff25a093705383da847414c3679e04683adf8e405a1d4a4ecf43913be756d60070cb52ee7b7dae3ae7bc31f945f6c260cf1359022b80cc3447dfb9de90656d02cf2c91a6a6e7de8518497c664ea33a6da9b5ee342eba0d03b833df47ebb16b8d25d99bce81d1454632967087de020e494385b66c73bb64ea6141acc9d454df872fc722b226cc9f5954689ffcbe2a2fc4551c75406017850255398b7f050203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e041604149c5f00dfaa01d7302b3888a2b86d4a9cf2119183300d06092a864886f70d01010b050003820101004b36a6847769dd3b199f6723086f0e61c9fd84dc5fd83681cdd81b412d9f60ddc71a68d9d16e86e18823cf13de43cfe234b3049d1f29d5bff85ec8d5c1bdee926f3274f291822fbd82427aad2ab7207d4dbc7a5512c215eabdf76a952e6c749fcf1cb4f2c501a385d0723ead73ab0b9b750c6d45b78e94ac9637b5a0d08f15470ee3e883dd8ffdef410177cc27a9628533f23708ef71cf7706dec8191d8840cf7d461dff1ec7e1ceff23dbc6fa8d554ea902e74711463ef4fdbd7b2926bba961623728b62d2af6108664c970a7d2adb7297079ea3cda63259ffd68b730ec70fb758ab76d6067b21ec8b9e9d8a86f028b670d4d265771da20fcc14a508db128ba 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 1936 msedge.exe 1936 msedge.exe 2488 msedge.exe 2488 msedge.exe 4992 identity_helper.exe 4992 identity_helper.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 2488 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 92 PID 776 wrote to memory of 2488 776 2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe 92 PID 2488 wrote to memory of 1192 2488 msedge.exe 93 PID 2488 wrote to memory of 1192 2488 msedge.exe 93 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1060 2488 msedge.exe 94 PID 2488 wrote to memory of 1936 2488 msedge.exe 95 PID 2488 wrote to memory of 1936 2488 msedge.exe 95 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96 PID 2488 wrote to memory of 2460 2488 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-10_7394131db0517873d7b3a88c634cf321_bkransomware_floxif_hijackloader.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://playinfo.gomlab.com/ending_browser.gom?product=GOMPLAYER2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff45d146f8,0x7fff45d14708,0x7fff45d147183⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:83⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:13⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:13⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:13⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:13⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:83⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:13⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:13⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:13⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:13⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15565250803478561690,717099525190965084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5352 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize912B
MD502d4660c973635d6e9f964d1c4a4f8d9
SHA1bc0b6f7443b5c1cf2e7c73f90f886b5212a47014
SHA256d8dc1f0b828aab60b50a7f4dab13ca57b481492eae6c58aaef6b973a7d495253
SHA5129cc6e5decb94aee647550b47b3e94ce5512418f4cc1b3cbac81953eaaf095c5b5ffbf6e3a1d505aebbfe5fc744732a3f4e69e25d4d93a0db9aceac2ab0cead0a
-
Filesize
3KB
MD512517bc86279ae28cf38674ff0fc9c28
SHA16987a2e2298ad750afba4a65b5567b8ea60e1ae4
SHA2568b240c181696cffe46fe1369a9817b2cbe738f06cbade37e9bb298f3f42a0fc4
SHA512a2d059cc3bbf39444446f1d400d9b8192f99605f8c0b5d9cd35e8d5a21ddfe53d77038601e01d4a1b326c59c9a717cb51a5eaf125308eb50c52320ba5191c918
-
Filesize
5KB
MD545b775afc10f5b2a6fa9dad208f5bb86
SHA1be7bfad05b77d0fec59dd77f29e6397cf89ddb35
SHA256f6fcefb4188c84a49d796641c11a0571b5744578c04ddc2ec873e295a9e2d3c4
SHA512563c89a53205491565045c2f77030359bb8f9dfca998907042f8fd90377c9b791236d84cc2fa7bc6e42589dfa230a4bfd5dbaae5c3dd890a928fd5804de81d81
-
Filesize
9KB
MD5d24882bfba5bfd2496d605a0e0edcdff
SHA1aa80a219b3f75146abb8c330b7a609d14620ebb8
SHA256b0c23cd33675ea512a9beda9031de967f053ae274cc0c28526d44426b7379fde
SHA5129162906bdcdbbb05329dc012233c172db07d7fa08fb6e572d452b183a18feec400bfb117208691f695378c9afbbcf435f7e9544dfd42daea1e0cd1eebc841d2f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53425098691f4f3f3447eeb7704c26c69
SHA11572ba887d220a2595b8ea962928225e36ecf50c
SHA256f604108ad5670b6bb68158834e70c94dfac877e267572ac0fd52028b29a546d7
SHA5122714ab9c5c5ffca587ce5e6a4c636001881c23d89dc514a919216b8fca58883f5c9f69d4b0d51529844b4468c0e22eeaf5bfd6fb3d032755fa79ca1255c8caba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58241d.TMP
Filesize48B
MD58be1717ff56bad0151b5311bfc8f7092
SHA1856f22e4de9d1d5c0d0952cf1fa558a924cc1266
SHA2562d26e5345e1b25df442dbf7396dc5ce30cb6862adde2aaaea1b9c4ab909f27ae
SHA5125905ddf7d9129580d2532f9b0d501267f1e271f8091a949dfa6fc5aa4b643d2e9ed62c65135d1b82321fc9e4ec11a24f94626a089c05e80350eae4775250cf5e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bde4ac230042c0b8cd7e8cad161b7114
SHA164270531aec1a08c475e4ce18561998d3217bcea
SHA25680951a29d8c201d7a826b22fe6276da864a939af048cc2c23dd9cc322bbf0904
SHA51233a74c4d3157488479a805b6bdb404c9f929dd329d737e49bf46d3533681f6cbff80c57c16c8faae34e67aa29461ca14a6c809bbd77ab17301ac66ef0372fec0
-
Filesize
14.3MB
MD57740b91aa5877cd86117db93dc5b0426
SHA1b02a401b86aaa41768a15e4f027dccb812341fb7
SHA25644df3a987ad432ea7942d8923dd2a8e29f3204119274ace5b0c5181838557564
SHA51288890d8956872c8369ed2b3ede2349ae7021a770182dc3904f1ed983ae006355067d294abd0c5d77fc40c20cbad9e33e76bb29fd4d778f11079926bbc58e810f