Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe
Resource
win7-20240903-en
General
-
Target
2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe
-
Size
14.4MB
-
MD5
44aa22808b1b213388579c9489b33ecf
-
SHA1
43d0dd08957b8c9890186e174bf1fbf003c5b7e7
-
SHA256
4c58ffa3902b87d8290cb04b80790235ad03b093ec1ff32d67b382506943cd8b
-
SHA512
1414ab6e4d7d038b5445428129eb8c7336b0b33bce1998e7a7cc0a232cf5b2814bf448f6a69a9df0f28ddb8c31584dc8839061653eb00a4a075ef012628d83cd
-
SSDEEP
98304:8TVtQIZETGdOfW0+bs0ZmjBjcaw2lsuze/iBXsLVMZHvOyGCPvPZVDByQNdXCd01:8bt30t0u/Zk2JXCd0LWkVgeXSK
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b1e-1.dat floxif -
A potential corporate email address has been identified in the URL: [email protected]
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b1e-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
resource yara_rule behavioral2/memory/5112-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/files/0x000c000000023b1e-1.dat upx behavioral2/memory/5112-51-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/5112-64-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe File created \??\c:\program files\common files\system\symsrv.dll.000 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Toast.gom = "11000" 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F\Blob = 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 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F\Blob = 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 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 3932 msedge.exe 3932 msedge.exe 560 msedge.exe 560 msedge.exe 1644 identity_helper.exe 1644 identity_helper.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 560 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 93 PID 5112 wrote to memory of 560 5112 2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe 93 PID 560 wrote to memory of 4044 560 msedge.exe 94 PID 560 wrote to memory of 4044 560 msedge.exe 94 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3540 560 msedge.exe 95 PID 560 wrote to memory of 3932 560 msedge.exe 96 PID 560 wrote to memory of 3932 560 msedge.exe 96 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97 PID 560 wrote to memory of 4676 560 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-13_44aa22808b1b213388579c9489b33ecf_bkransomware_floxif_hijackloader.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://playinfo.gomlab.com/ending_browser.gom?product=GOMPLAYER2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb688346f8,0x7ffb68834708,0x7ffb688347183⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:13⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:13⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:83⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:13⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:13⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:13⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16962682493723259454,12754970173139914834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize936B
MD500592f8f50bf473a8e83f954dbcb54c2
SHA1acb2c43f45bb855ac9edd12cadd7f5f2f6c806cc
SHA25612b5409f2f2677b43b45823da37dd65639a5b91cf52daf0dfe961ea02d652e35
SHA512a565aeeb0a8c16544218e0e91607ccebd31a5271c82ae40db31ae4725b236d52dd5e5878c9c8436a0f0417d8ae6e7031be9e38d5f07b79ed13be2a84168cd018
-
Filesize
4KB
MD5c72726b597f71b66460cedfcabf79762
SHA14735b2ef7907a80c32506b3532fefae9fa69ab96
SHA25685cb8cef9eda6b1772b5b287202762c753c86156d52050ef91cf72c2ec0a81b4
SHA5129d8c2603410577d8e2d8d6907069ceab1f15431789721804706bf5ce2650e3a1da5db9b3b1bce3cb2baf2ca149ee4d6eaa2d895f7f84b0798c2f1ac22b6e36c5
-
Filesize
9KB
MD5613394d74f55f9ed969be04cdeea722f
SHA14ab5c9ee48e2bc61d2bcea076d2550347128534e
SHA2562c1d80b820d62f0fc1dc190604ae9baa32a6926866ac46041185a6bad2ec52c3
SHA512f183a05f882074c02a03f565665e609c8f49016d58cdef5f881af68f83b55d571cdbf6b730ce5c143473ac82456ede1f6745987c686293ca18529f2a3b254cb7
-
Filesize
5KB
MD53635a7650237023e7ae59ed5473b60e2
SHA16d0b8e7124bf8eaa570eda858dc02f2ffaaa34b0
SHA256934ca7818ecb3ad5578db60b71188eceb8c5ccd208266ea40943c7bde734806b
SHA512d2bb972e27b97b7ad6fbb47aae584ad0fe847956abf281d21f7d1173cc28a4b839ba85c7eafbd15d8892558c45f0f89d066ee65d1ef830db51ff10a929f6cbbe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5a438aac5aad9858d845be65426415d65
SHA15d7b988140662765ce5cad7cf4413ee619f70aea
SHA256d4a688c769a66bce15eeac92e586208a0e84b4f94248cc4912c4c72efce5913c
SHA51268eac9e086f1af3ece6388dc586339b401261e719a90af95827ca8026184c774ef82a715bdaa7afa9b6b95d9a9c6ad616408a697a6b2577eabcf4335db683f9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f4a1.TMP
Filesize48B
MD5ba8c56cdb084bad8bec83333c96352af
SHA16627e6a2528ce3cbf31e5d1dc5cc662c988e309a
SHA2563906c077d5557d63fe917a1593b475fc3c447990ad6d444a414bef456076acd1
SHA5124b0bc8cc0ce83580476c4fd5188fdab962d9686651b392403b981a8fe157382e77f0ceec8753af7372057acba435746fd52d97d474c1d0262f8cc46d543e9937
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5311ed6d1c717ab621f4893f7d1963aae
SHA1b9e431bc4da73cf73d4f82c871f54f703adc02db
SHA256a0f0b3be71b5a733b783c324cbe1b139f72cad6d005956342abbd8e7f5ed8def
SHA5127c996e2098eca37023147720bfc7a3208131ec00484ffe0ae71bdec2b796816e66d1f624302e5910de0d98f0c33cb972dcfcdc702ba367aa0ac673c90c5975c8
-
Filesize
14.3MB
MD57740b91aa5877cd86117db93dc5b0426
SHA1b02a401b86aaa41768a15e4f027dccb812341fb7
SHA25644df3a987ad432ea7942d8923dd2a8e29f3204119274ace5b0c5181838557564
SHA51288890d8956872c8369ed2b3ede2349ae7021a770182dc3904f1ed983ae006355067d294abd0c5d77fc40c20cbad9e33e76bb29fd4d778f11079926bbc58e810f