Resubmissions
18-12-2024 12:18
241218-pgqceazlfn 718-12-2024 12:17
241218-pf4hmsylet 718-12-2024 12:16
241218-pfevaaylb1 718-12-2024 12:14
241218-pegbqazkhp 1018-12-2024 12:09
241218-pbmdkayjf1 10Analysis
-
max time kernel
68s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 12:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/kQoB54
Resource
win10v2004-20241007-en
General
-
Target
https://gofile.io/d/kQoB54
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Steam Checker By Scorpio.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 4 IoCs
pid Process 3972 Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4836 Synaptics.exe 1580 ._cache_Synaptics.exe -
Loads dropped DLL 16 IoCs
pid Process 3972 Steam Checker By Scorpio.exe 3972 Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4836 Synaptics.exe 4836 Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Steam Checker By Scorpio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steam Checker By Scorpio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Steam Checker By Scorpio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Steam Checker By Scorpio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2540 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 3556 msedge.exe 3556 msedge.exe 2700 identity_helper.exe 2700 identity_helper.exe 1292 msedge.exe 1292 msedge.exe 4952 msedge.exe 4952 msedge.exe 2340 msedge.exe 2340 msedge.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 1580 ._cache_Synaptics.exe 4804 ._cache_Steam Checker By Scorpio.exe 4804 ._cache_Steam Checker By Scorpio.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 348 7zG.exe Token: 35 348 7zG.exe Token: SeSecurityPrivilege 348 7zG.exe Token: SeSecurityPrivilege 348 7zG.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 348 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2540 EXCEL.EXE 2540 EXCEL.EXE 2540 EXCEL.EXE 2540 EXCEL.EXE 4804 ._cache_Steam Checker By Scorpio.exe 2540 EXCEL.EXE 2540 EXCEL.EXE 1580 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3556 wrote to memory of 520 3556 msedge.exe 82 PID 3556 wrote to memory of 520 3556 msedge.exe 82 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 2192 3556 msedge.exe 83 PID 3556 wrote to memory of 1480 3556 msedge.exe 84 PID 3556 wrote to memory of 1480 3556 msedge.exe 84 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85 PID 3556 wrote to memory of 216 3556 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/kQoB541⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d0cb46f8,0x7ff8d0cb4708,0x7ff8d0cb47182⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8126302328533849558,3879484678996298503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:920
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\" -ad -an -ai#7zMap32748:120:7zEvent54301⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:348
-
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\Steam Checker By Scorpio.exe"C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\Steam Checker By Scorpio.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3972 -
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\._cache_Steam Checker By Scorpio.exe"C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\._cache_Steam Checker By Scorpio.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4836 -
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\._cache_Synaptics.exe"C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c12a7f1f022815f3aa8257df1fa61f74
SHA1d76877733b009657488905eff2aaeb3e4b0e25c3
SHA256233f4250d8f2dd7dc243a190270ee16616bcbac884c11006d9a01a3645b9987c
SHA512e78775f9a8f74ef15d3854c345b94b7d233c8abce22ab1c2897c6c4304437e54cc9935cc4a339603b7f20e5aeadcc5c5d5bffcaee4cb3865ab007348b70f3055
-
Filesize
547B
MD5eff9ee1a4a81161aa994ecf341bf16c7
SHA1c9cf81b8ce40b69fc4a9174a916e89587b3ecddc
SHA256d0a9fb172fb0d5ef21a24af2017c3daada14f8607663f689d353e77ac8f4c592
SHA5128424250514d7e28dfef8faa1c5a50f51f00d1d0b64c28c140ab6243840aa60e9129e6c713fc58e654acd30e538e0904ae6dc2ab7434266b7278dc86c24c19f09
-
Filesize
6KB
MD54f34272575c26041f014ccaa167b74ab
SHA11fcc6c8c3af09c7975ba28e1ce47f37e98ef1c73
SHA256cd63bbb4ade5272fe518cae812d1cabf714bd0b025e3e163bad78ffbbfb6d501
SHA5128848b3620424ec25c9758392beea15efa6899088fde79021b9803f210e721b9237489bbd553b96a7c5fb210ebacfff6217871cdd593547ad88bc3da4ddfebc9b
-
Filesize
5KB
MD5cbcf954860ecc9d76004bb5a32d5a667
SHA1c61ea9fe5294ac6df20f6506b25e20c02d04e94e
SHA256ee1328baf033c678a6d32f57817350127bcc353f585fb2bbf3526fbc4ebb54f6
SHA512aad2c0e17377b10d0e70d4320d5bffde9d289a5100ad36db5608605296a1f499383c381397cc61e65328633eab375287a57e5770a03da28aec573ef062e74360
-
Filesize
6KB
MD56ae8c17ae4d2cfe3b7d5d1701c4d944b
SHA1c708f0a7f0f277dbd5315c0e2d32e6fa9b6658b2
SHA256b92b5381c763aea0c0cccaf83bc13f3c629f20bd3f3513189773b7592bd59661
SHA512119ddfc7029e16e412380c22135becf06b1fb37a409be9d9ef86482995ef86c0134d37a369f00d65929ad473dafc5b01ff980204ce219e0e941fbd65e2567c21
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56c426cc4adafcffc92cdbd5a01dc75f0
SHA159428928cf654a605d234834c928ebbeef2e376d
SHA25647e707d80395b42ea7e381606f494198a12b1ac40d691a5e6f8d3304f14353c5
SHA512830cad64594097eafcf1c95669a714e8110cc6443e7d92c4b74240dcdadb8c4618d646b56528d758efc103cc93777838c409d1ba0b1d893aaa1bfd4206ca2590
-
Filesize
10KB
MD52f33216d9c806b7e78cca1e912a9e817
SHA11318be072fba9f42df0ce5d04214f64473767300
SHA256884d3f0f05d407a8bbd839aed91666e108f8d301c865748660f27adb636a200b
SHA5127cafb65c1a03326b19181e175528800efc5f7a1ad61fcf9fc0623ddacd0b836be67de8437124b33eed137d9bbede8458d8d49aa8b626741bb7837048a3c4ecb6
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD59efab3037e449e8e83bb00e49b5d38c4
SHA152d80e375ffa431719d57add4044416b2793fe8f
SHA256068be80808112f6dca2fa2a576e38d3aad598332c9b8acf81ae472de1cd6c13b
SHA5128e020126b59d8799d012af54ddac26e103f1ae85295901282a6f2323ee254eb6b2d06ed53a834e2fad8a675d8ede7590c0bf9f96e43368a31026ea5a481151e1
-
Filesize
57KB
MD59e7f44b8f1512476aa896e977c58830b
SHA1eddd878d9e16502ee1eb7f583dd04e01b458ba42
SHA2568e6195b50bb0d22e4d346263f708f166db726c84884fe78a6bb477caed19e708
SHA512ea52b71dc58e081d0e6c1336e7bf8422d7240c8a502c790075c6ebfe88f8ff70cd2bf43d34b8c604c08d867202359f8bd35c3a0b8d2eefefe826ccd2e5c8c802
-
Filesize
23KB
MD5404ee0ffbaa35c9af0404e701bf8fe14
SHA1da59fb54dfc45611a03471bba7d5e37ba9c3a7cd
SHA2568c35a25313514bd6e767b97c95b9433c2cb448be60053b843d6d33a0da885e7e
SHA51287de05aad0b773ea9603b72fb7269d1eb8662af8c5214b3506e5f603da19fafeec2c03a9bea6a6d6ab643c257d24d1372c78d58d80c7c0d6794bf25d398d2e9a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1.8MB
MD5659ccac29a8ef6a918146e1585ed4288
SHA1a06ebb0d13ea282bcc75b7bc8696cedc0a242696
SHA25647715294a4a85e5308a26b046bc13768f3e300911875ad92b8506aa154ef1a61
SHA512bb466106d7485dba2fb193186a771cfcbe85d2b6d1ec7a70040c8b4d4238b9ba7d101ca3aa6d294fd1f399b3596ce70902c72bd4407b1b7f0447b8166bbfc695
-
Filesize
1.5MB
MD5df2aa099aaaf245e1125c949431ce534
SHA17fff72baa77272e1e314802cca2009c3c2d38936
SHA256e539ac53241fd8d1d1d80e4b9b97f19cd7bf6fbe9b77fd24da09717c634d3677
SHA5127de65faf0bd0ae75535d7061910d8dbfedf947d9a374baab6ff7f4643b1d4a64ec5a26d6f534cd79808e33e9025bb61cd79c3cbfb3d0d0b007289958173eea4c
-
Filesize
2.5MB
MD554e9a24fb3a19ddb0cde9bdad524d8cf
SHA1bd17493ce33aacb976881be496bd4b394cb239c5
SHA256387b084b873eca8ed5eaa5e47e5e37fb2535dee764feb85b58b0e9b616dc7b09
SHA5127200386f8a970d5edc218500c32026f4943833029e5cdd73e2b051ef8c169908a1602dc3ab73e5defd89a9fe6306bac3c4a2bff4fe0f0bdb2e6fe4859568fbd7
-
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\._cache_Steam Checker By Scorpio.exe
Filesize1.7MB
MD54ef4d48dec1058e81817e236c78df04a
SHA19bd81c4eccf3795a49f5cf6fee063b5371788d1d
SHA2562e26221cdc9d70eb6ddc9f3651bfb6b2fad4e705015ffdbfae231173e7a4d713
SHA5126ebf6328abde40ae3007e8041dfd1b606fb314417857f2b6fe8da294703958ad5e978b11f090b2ae5cc7096e79e3a2505e9c8fc6f2466826a3d1152036d7d8f1
-
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\Bunifu_UI_v15232.dll
Filesize663KB
MD57d723a8eb4d7e494ea488c13510b97b6
SHA107f07c10e0661fa5f272a61ce69ed95c1cb251b8
SHA256b695ac865a5df23e45ff991bf26b71e4f879c89a1a6fde0ba92f31904beaca5c
SHA5125ff49cc06df33b65c2bfbf37d89fa6ae2b71e26046bd7cf96a374ceb840ec7d3e11761f94b0f67b9ae38e4fcb1fe836c09a0b227e4a478f775a7511eda9d133c
-
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\SkinSoft.VisualStyler.dll
Filesize1.0MB
MD569e6563e0e7ea843e9b37d58819f4136
SHA14aebf9955ba0d0b5205b6b013da634aa0281a25d
SHA256f9fa9f508b9350ed12ed3aa5b7f24aed901a6434b1b02d1f0ee301b8eea54b06
SHA512c883bcb3f6f2ac3f2fe88eed1356178ff2b43bdeed2188aa06f35cbc9dda8745a3a5c2d28d99daae5b6ea9af46abcae45b7bd4da13f318ba31062a8e8b79a942
-
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\Steam Checker By Scorpio.exe
Filesize2.4MB
MD564e630606dcebfdf0ca89827767923b9
SHA1576297c8d8389ae183eec599006f607e98115401
SHA256443f2dae5074fa6e763e3f89cd727236826ff2c53e7540f2b4f1be84cce8e288
SHA512f74747aaea6d031dbf313e6914a960105dffbff0664272d94dc8a750af5869537cadc6edba8b1e5f1661e69c9ce107652168ec23203baab682f0dc6d13d28455
-
C:\Users\Admin\Downloads\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\steam checkerv 1.0 by scorpio\xNet.dll
Filesize116KB
MD53df8d87a482efad957d83819adb3020f
SHA1f5b710581355ac5d0de7a36446b93533232144db
SHA2562ac175b4d44245ee8e7aee9cc36df86925ef903d8516f20a2c51d84e35f23da4
SHA512da28c34a85a6530b1c558fa11b0e71e70710d719cd8ceaf81f954d1fe3927ec139bee6c5f3135425cc5220905240f1a31d831611c46d18f5d52600b607ea59a6