Resubmissions
13-12-2024 18:20
241213-wy6jaaxjh1 613-12-2024 18:17
241213-wxfw8sxjfs 1013-12-2024 18:14
241213-wvrwqaymam 813-12-2024 18:11
241213-ws1qvawrex 1013-12-2024 18:08
241213-wra4sswraw 813-12-2024 18:05
241213-wpj9paykdl 1013-12-2024 18:01
241213-wmcrtsyjfr 813-12-2024 17:59
241213-wkpcvayjbn 613-12-2024 17:56
241213-wjh5faxrgq 8Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 18:01
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 5672 ArcticBomb.exe 5896 ArcticBomb.exe 5952 ArcticBomb.exe 6044 ArcticBomb.exe 5232 FlashKiller.exe 5340 FlashKiller.exe 5644 ArcticBomb.exe 5792 FlashKiller.exe 5868 FlashKiller.exe 5832 FlashKiller.exe 2380 FlashKiller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 100 raw.githubusercontent.com 99 raw.githubusercontent.com -
resource yara_rule behavioral1/files/0x0003000000000709-602.dat upx behavioral1/memory/5672-631-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/5672-633-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/5896-662-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Program crash 6 IoCs
pid pid_target Process procid_target 5296 5232 WerFault.exe 143 5488 5340 WerFault.exe 149 1908 5792 WerFault.exe 154 936 5868 WerFault.exe 158 3652 5832 WerFault.exe 162 2348 2380 WerFault.exe 165 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArcticBomb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FlashKiller.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 415091.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 319747.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4704 msedge.exe 4704 msedge.exe 3692 identity_helper.exe 3692 identity_helper.exe 5564 msedge.exe 5564 msedge.exe 4204 msedge.exe 4204 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5936 msedge.exe 5936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 5056 4704 msedge.exe 83 PID 4704 wrote to memory of 5056 4704 msedge.exe 83 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 1220 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 85 PID 4704 wrote to memory of 4888 4704 msedge.exe 85 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86 PID 4704 wrote to memory of 3280 4704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://github.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffec26e46f8,0x7ffec26e4708,0x7ffec26e47182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2092 /prefetch:82⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6692 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
-
C:\Users\Admin\Downloads\ArcticBomb.exe"C:\Users\Admin\Downloads\ArcticBomb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Users\Admin\Downloads\ArcticBomb.exe"C:\Users\Admin\Downloads\ArcticBomb.exe"2⤵
- Executes dropped EXE
PID:5896
-
-
C:\Users\Admin\Downloads\ArcticBomb.exe"C:\Users\Admin\Downloads\ArcticBomb.exe"2⤵
- Executes dropped EXE
PID:5952
-
-
C:\Users\Admin\Downloads\ArcticBomb.exe"C:\Users\Admin\Downloads\ArcticBomb.exe"2⤵
- Executes dropped EXE
PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:12⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 2043⤵
- Program crash
PID:5296
-
-
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"2⤵
- Executes dropped EXE
PID:5340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 2043⤵
- Program crash
PID:5488
-
-
-
C:\Users\Admin\Downloads\ArcticBomb.exe"C:\Users\Admin\Downloads\ArcticBomb.exe"2⤵
- Executes dropped EXE
PID:5644
-
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"2⤵
- Executes dropped EXE
PID:5792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5792 -s 2043⤵
- Program crash
PID:1908
-
-
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"2⤵
- Executes dropped EXE
PID:5868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 2043⤵
- Program crash
PID:936
-
-
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"2⤵
- Executes dropped EXE
PID:5832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5832 -s 2043⤵
- Program crash
PID:3652
-
-
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"2⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 2043⤵
- Program crash
PID:2348
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:12⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,7208626524942497604,5748478053823570493,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:1388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5232 -ip 52321⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5340 -ip 53401⤵PID:5460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5792 -ip 57921⤵PID:5676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5868 -ip 58681⤵PID:5892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5832 -ip 58321⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2380 -ip 23801⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
17KB
MD518a9531f05f4a3662558d102349767b1
SHA1328114b78180b5931d651669bf0b21d3a5cf8adc
SHA2562d427df292899c50caad69f5c59737ff07f39544e52ff6b9d01f4fb82ec0d716
SHA512b52d9f81a88694bbb16551a50fefd69a3f3dcd0ce5d3d3f3e3a2c1d7de969b5f6e27ca9fd22f7e964108f9b39eb083a44ef161ee3b8c39f61fa5939a15d21b2f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD59e03e52cc6fdc0d0e107a49ad4c3ef8e
SHA1ce378faad9feedbb2b2704f667be06b8281cdd84
SHA2569d63a06ddee4426687f6e870420613ce26aa61a02ed654e01b394b6beb8fad6f
SHA5122a87cda0f5c11c5047ead96bb24d244b8ed041b8d88f036e4858eccaf52248121ed3cb0daef5e552d32fed2d6ad89da8633ab07b2d736d72114cdd85b46e17b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a7b24d51ec17071f857f8f14fc021df4
SHA134b255bdc1607d05b89cc79229e1a30cb5fe67af
SHA2569d36ca9478545ee80cc751e3c4cb6f4ea08d746ad42ee2c291460dda968e94f5
SHA51285c64ddfc90f834ad882202d8a6ef8c63bc8f6ad0bc0d1ba7fb0f2285a33c1213d95af5a241f1167cddc62752c4d4bea61debe726d09562887f82c0d0cd4c058
-
Filesize
1006B
MD5e59fd2476e35c7057e5361a30a91d520
SHA189cf267c3ece34ab7bf18d6692c22e86889d4e2d
SHA256306bec532c13493837fbecdf1171cd52434242f2237f5f15ee0e3f489f1200fd
SHA512ea60529a8b380c64857e041b5e4ce1985908c71d8e6f607f1ff6e305ac4bda7b56e273c25ec8bfbd8dc0b63bcd968fb30a6befe2bc419d1ce49b023d803a7efa
-
Filesize
923B
MD532bc687df01b63fe0955a06d02148551
SHA157d09a16665cc1cc28a68ced51a25cfa3aba3a36
SHA25676b61fd701a8f8dc5479d0ee2259bb9f50bb3a0d8a85828d816de31609a70aa7
SHA512641066b92bc6ef2857f4c8b735a94dd937a6e3b375d800fec6a8d56570512196ac56331d976fb7434afc5376d4e1709872ac27a6dc33fee85d0fc74853fd4d53
-
Filesize
7KB
MD5c0c280dbded944ec739a4d6bc2cd01a8
SHA1f6b43ff085a984ce4eb192cb5e69584ca2efdd1e
SHA256173d9cd7c9ab822d7dfd32affa3831cfdf133e832ba495f3174ab89a095fa560
SHA5126d23e35a28901db398cd8953454b5c316dba179781dea21e7431626e9660aea0e189df35fa54b4f33401f6c6881055c6f62832af90a1d53a6c05f25982b86a12
-
Filesize
6KB
MD5d2b61f6b8fac4a891ee1cb4e2680a562
SHA17d4f0b49bf27a3e046b427727256fedef2f3f5b0
SHA256b453615b5d54f52a6696bfa658e13a77bd865bfb5ebebc1958fa32bbb5b565a0
SHA512c01612a5b3d908fbb97046015c234cfb9a4505bb4b503c4961f8dace3842888eb25f5fcd2aa1d81ca15457b7f160e1cf60e5b091513958f971eb19f66f4b10c5
-
Filesize
6KB
MD585dfd89782acf713bd4170fe263c0a0e
SHA1f573df9f6f0656394ec6cfdc0b8ad5a2ce678622
SHA25689764e936c3543b606d1a36ddb8e69c7e9919fe0e96b3ed8629def18001c46d7
SHA5124f541ebafe65af8c4132735d5464d2ae97c459b02a1c466d0f0a10231a31dcb82a534b1557107faf9d2a8d038166009c5cafafb78264aad9a47dd7eddc44e023
-
Filesize
5KB
MD5cda3f2a249af3ea529b619a22ae2d9de
SHA16dd1a75ab5eed2fb1ba170ea89a04b742b417afc
SHA25694d2783a55cd24a47add069223771dc29c1c4b891535695458db73c74d465471
SHA5121354f4d14790a855a30edd537eca1406439bb5194e28e56e28b7a776f72f77ef21b680fb78c806156214c16276c845bb20981e737d7bca9919857edb16d7529e
-
Filesize
6KB
MD5ba8c3019a7883bb1248f91b9bd733bd1
SHA12fb4459e15a9d3b24f46d326f9e1c2e8da2474ac
SHA256690df53482cb6b08f489ac0b251c84f0b098a9210398cc8946fd41b095923802
SHA5128215f73605afc427b1cd2fd07036d6b61782bc9b3e5fbfe4fc0e2347d27f849fccfd7c3666211fbf3ab60fe1e06fa33e6928342cef42ad693840de1bb5c821fb
-
Filesize
1KB
MD5d36b4ba4fa83da9bcc6fb1649538846c
SHA1479bb6b35890106b9a44ea1bacdf445685bf3343
SHA256432f4b6c70a571f9dfe6c08fd1996b41d474e32f6650652c675cbb3ed852f945
SHA512bfc7da8d685fe80ffddf9be6154a6056a6990838c8e7c629bf9309dbefcaabe700539d6aa0453e6d658c2d55ef7e0f105fcd17ef02017f18c63ce07dafbab061
-
Filesize
1KB
MD512734e518549e2a82b1ff7b4bf4be6ae
SHA10bcff522982d8454176cf7770026a3ad4fcba6b2
SHA256617dac1ff63c31bd8eee7cf51092c1a92abd9cb9910e89bfae294dcf28a2ff5c
SHA512017973673475887283eb167573f58d335e953f6ab2d61f33076747eb1a3528ac69e2547ba9902d6f80bd9e45c1326b9ffa5a2d4b8d7ef1a322159d3fea454cfa
-
Filesize
1KB
MD53052f7a8d6454b3378dd411be6ced096
SHA1fb190beebf8f7af0fe1c877c89eedac88cffb2e7
SHA256508a5ec7f7beccebadc76aa9a24e75dc240245b07a4b72fd3406bca249d3579c
SHA5127e8cdaa8d1f1ef2f7da60407919618ee63c98f043b60eab55c4c44372065a67d10816238402d4fa8ffb9cfedaa04059b1ce4707e338cdc837e69f830561c2e68
-
Filesize
1KB
MD57b38029b3f3e68a421e4a515983cbe41
SHA1d44b98d9c40ca1f8353de90c2484cd39b5e64127
SHA25648394da4abbd950ed1e952d853f956a7979666471749846b5eb576431687f70a
SHA51205d8645f3c9736912b2f79979d9c162d4d6eb5d759624aba488bd29b05af85a02c2befbfc8c9250d29fc78b4d7d1a9bb7379232553aee4f6a80c01cfacc71746
-
Filesize
1KB
MD5345a7548623016d649b6959495888084
SHA16e1ce7cf2ad8137230d8ff7b7c06b43cacfb63e2
SHA2563d0fe12bdd7a5f11d99dbcb1813f7203aea707f33b6ca67f3316c536369c71f3
SHA512aeb628ce4057c4adc2b6c127ac88385668c6e7cb3c28c41089004301bf7f0d65bfd5e8af0740c53125f2d083e2dec16a8687cc4b07038628cff809adadb29b3c
-
Filesize
1KB
MD5123bd66d97047d33bb487bef3a505475
SHA1be28b7c4da9940c4a4e8964b39315a91105fde65
SHA256e30edf840fbb58df4b4edc1f98fdd970b67e7e5111c89b9fe2738a70909b413d
SHA512aadf072650a544f8525a716abcb1cc7a9efde8ffb6f16778a1b490aaa233182d8bebb2515ef84e98a31b37caba3c4f21cca08fb2cf56ee7ed9b9e9bf925c308c
-
Filesize
706B
MD5102954b9e8241bb666b3211426452a0b
SHA163e9eab90d48d14faeea7d1054258b9c46656738
SHA25663fabcead2b3cc03eab7775c9d18b40f8b8b846d1ae34c4d3e99d757f4343a12
SHA512f6bc2e15571fac84b80cf3ca2644a20ad989f576c4afffca6e52bd3bb8839dc8fa7a7b383d5dcc216946a97745ae619bc243d2390e3d31499b6c1ac3c6f816f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5929e15965d02d71c7b88cd01eac1f1e5
SHA1bdcb50385d14907068d30a2297323e6973050f1b
SHA256ce2b4396dd60b9b49099a355d7a898229c01d206795025bc24cc83942966f02d
SHA5126952cdf9ff280f38ff8ae3fe325ad20ae4560cd62f00fb662fab565dbd03c182b550e38edde1f2a4e7ce728b083592a763771f8956252eb912092154568c396a
-
Filesize
10KB
MD5526dabcbc4941a7dced68bd5da09fa32
SHA1916bac0605b9aadcef33922a742f67b8a957c5c9
SHA256a68cc8c9057efc01ed6c5cb9425f68eb83ae500dd002142491fe7dd58e42632f
SHA51275d0507fc7f53238622dfb02d3e4ce3d2d632f0e49e29102c14584aecde40acc11877d13d724313e8a8065fd51cb16d2d23da43ca792778028d769eb66725abc
-
Filesize
11KB
MD505f54133162d746450fefa53d28a15b8
SHA1f8568a7237c89c8775be30b074498e29273693e4
SHA256901d9393e189c903e350e48f6468633b13e40f7780676974c93123d2ceb18671
SHA512ce34f6e5efd08bb7314afaf43c3ce708106bb70f4528d26365a60caac7982dae5dd4036eed7c6238e86901fade769677fc7c8c9b21fa338cc1911308f8fe472c
-
Filesize
4KB
MD5331973644859575a72f7b08ba0447f2a
SHA1869a4f0c48ed46b8fe107c0368d5206bc8b2efb5
SHA256353df4f186c06a626373b0978d15ec6357510fd0d4ac54b63217b37142ab52d3
SHA512402662eb4d47af234b3e5fbba10c6d77bdfdb9ff8ecfdd9d204f0264b64ea97fc3b5c54469f537173a26c72b3733550854749649d649bc0153c8fe3faacc50a1
-
Filesize
125KB
MD5ea534626d73f9eb0e134de9885054892
SHA1ab03e674b407aecf29c907b39717dec004843b13
SHA256322eb96fc33119d8ed21b45f1cd57670f74fb42fd8888275ca4879dce1c1511c
SHA512c8cda90323fd94387a566641ec48cb086540a400726032f3261151afe8a981730688a4dcd0983d9585355e22833a035ef627dbd1f643c4399f9ddce118a3a851