Analysis
-
max time kernel
175s -
max time network
178s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/12/2024, 22:26
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE 3 IoCs
pid Process 4640 BasesRow.exe 2644 BasesRow.exe 3872 BasesRow.exe -
Loads dropped DLL 3 IoCs
pid Process 4640 BasesRow.exe 2644 BasesRow.exe 3872 BasesRow.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4640 set thread context of 1804 4640 BasesRow.exe 105 PID 2644 set thread context of 4412 2644 BasesRow.exe 115 PID 3872 set thread context of 4148 3872 BasesRow.exe 120 -
Program crash 3 IoCs
pid pid_target Process procid_target 4940 4640 WerFault.exe 101 4048 2644 WerFault.exe 113 1976 3872 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BasesRow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BasesRow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BasesRow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 3364 msedge.exe 3364 msedge.exe 4860 msedge.exe 4860 msedge.exe 720 identity_helper.exe 720 identity_helper.exe 2620 msedge.exe 2620 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5072 7zG.exe Token: 35 5072 7zG.exe Token: SeSecurityPrivilege 5072 7zG.exe Token: SeSecurityPrivilege 5072 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 4556 3364 msedge.exe 77 PID 3364 wrote to memory of 4556 3364 msedge.exe 77 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 2040 3364 msedge.exe 78 PID 3364 wrote to memory of 4936 3364 msedge.exe 79 PID 3364 wrote to memory of 4936 3364 msedge.exe 79 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80 PID 3364 wrote to memory of 4456 3364 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/folder/wgv57fim9g8eh/NewPeggsEx1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8566e3cb8,0x7ff8566e3cc8,0x7ff8566e3cd82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6628 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6332 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4369737672999457227,18232354127777808049,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:704
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4412
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\" -ad -an -ai#7zMap31644:98:7zEvent177621⤵
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\BasesRow.exe"C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\BasesRow.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 10842⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4640 -ip 46401⤵PID:1456
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\jres\README.txt1⤵PID:4004
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\jres\THIRDPARTYLICENSEREADME.txt1⤵PID:1344
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\jres\THIRDPARTYLICENSEREADME-JAVAFX.txt1⤵PID:1680
-
C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\BasesRow.exe"C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\BasesRow.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 10482⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2644 -ip 26441⤵PID:400
-
C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\BasesRow.exe"C:\Users\Admin\Downloads\_Instаll_UPD_2.3.3\BasesRow.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 10482⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 3872 -ip 38721⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c0a1774f8079fe496e694f35dfdcf8bc
SHA1da3b4b9fca9a3f81b6be5b0cd6dd700603d448d3
SHA256c041da0b90a5343ede7364ccf0428852103832c4efa8065a0cd1e8ce1ff181cb
SHA51260d9e87f8383fe3afa2c8935f0e5a842624bb24b03b2d8057e0da342b08df18cf70bf55e41fa3ae54f73bc40a274cf6393d79ae01f6a1784273a25fa2761728b
-
Filesize
152B
MD5e11c77d0fa99af6b1b282a22dcb1cf4a
SHA12593a41a6a63143d837700d01aa27b1817d17a4d
SHA256d96f9bfcc81ba66db49a3385266a631899a919ed802835e6fb6b9f7759476ea0
SHA512c8f69f503ab070a758e8e3ae57945c0172ead1894fdbfa2d853e5bb976ed3817ecc8f188eefd5092481effd4ef650788c8ff9a8d9a5ee4526f090952d7c859f3
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD53018f25599190fb5652a2683f5b8a327
SHA17d679dd1544ec5f93c8cc581ed995a640d37877c
SHA256c197dbc47c90cf8937107ac39bf67ef3a0be867770a43f4a39109116cd5a0868
SHA5126e45f3aa1835d3e3256e9ea07dc57b9bfe95f083a34c313a506e5a18d7bb38d755735695583ad8dc514dd8b6951d43091c73a010805dbff9533002b0d35a1200
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD546ed03c4f19f0d75066432aafd68a7b9
SHA1f096a7e1253ed87f8f0ce61a9a11cb3543784f8c
SHA256b33aff4ffa8203ccf389a5b8c99a43453aa8bac41d31d6bd4c2a7e2c12365dfc
SHA512836295cb046f74c3985a54017089ead8dd7862d1cdd0e66414b79e0c36fb6d3c05924ab13faf4fd99e466367c6d8a815f0910abc80e2e7a6369c0bed1d514189
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d0929d436d066ff4e8f380080a2c8061
SHA1ab0edb8d8a5dabae9ac08fdc4b042defddda6947
SHA256631798805ca0e59f4d91a328b9318087b14e35681d5d7586ff83addc1aa5be7d
SHA51202c7019391ec41f45f22c7a4b8a7038c32a6f87b718e61ed5b5709d1a181c069ac2210d294034dbad394cb5e2660d008e2ead2259dd1c23245a2ce208caa87de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5321e91e169d8404a8cde2ec04dfdc5ed
SHA1c75ba92523ce25ead37e6b38a59ba3231c20c70f
SHA256cf1dd08884b47c74e239aa8e25789242a3953c3e5d0b9df3bcef50936647a4e6
SHA51243ea720555ffcd94f8c966a617d5e3a558d7c1db663e51940df4a32e1f6ceb89dc86e136f238dafd8274ac7a84dec31a70a6b9166bcd2d9d41a637fc9e4b0f55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e62fd6c8aeaa98f9ec499ec951f4f02a
SHA187740c84cc38b56942aead573f0eecc078418f44
SHA256e66e95de411fe36ce6dab0aa118430440133f01def1f921c7f986e848408ecfa
SHA51250a25551e623bb05e679b3d93b387a514fc07e6da1d7ce2836e73b6ee7a86b83b89654e2a802e2ccf7819bc1f957e42221f43dfe6a304c7c89a78d06e1061cbb
-
Filesize
5KB
MD5a5768298e4ff77ec4a565b721c6f8797
SHA19919c1125f78d67c3a90c1a00821e775d83c6d9b
SHA25636167b49b1c1c430b589dd1a5f00c0159bd4b15c6000098b57a0d2c404b99ec9
SHA51241fba6dd1331ca569e32068a8eee749471a8844a7610cfeee797518f46c4f18b45bde4995ec182134303eb8a14c84035571ea9045fa3beafaa2b7efaee2cbf2b
-
Filesize
5KB
MD5604a4bdb81832906df50c3c61274acf7
SHA199f95b2da342a12a5fd9705d46d359751d7f4a2e
SHA256c77cf76f655d3565ef12ab8ec4fda7b8196a50c587fa97e5e7cecaa202e40855
SHA512b34c1a5efce431327f4cf27981b9bb2232f85c90855b206cd64bd1a3a99c1af538f2f6ea103cb9ebce2818706b2c483c83b43e81cf81fb9c6149cc437d35818d
-
Filesize
7KB
MD5082c30ab36efbedd43f9cc858a87ee7d
SHA11ba1c84d34da2a4a3b871f512b23042737906edd
SHA256320e3364e7873b4b6702fac8d2e0260ece3262f5d65d1177c2875f56e0d919c5
SHA5128e4d891a9de4af3d44df081a924c991f277ef4f47824a4d987da453bbb18926840e2f55834fe2063e4aac759f50d7bd5550439bbd3711a3b9073f8dcf92a8327
-
Filesize
8KB
MD5f4bc45622576766bc52d593b679344ef
SHA10c96015da19054d0866a8f9a465937333bf5f671
SHA2566be6f2f91f7431bb341fc8865e33afbe6c3919149a5b8b25847daeb8fa2948f5
SHA51261bb81ee5fbced2d3400e156bf892818dcfb20d76aa1d428880efb105b291b1940a3445849d1000ed36862110a2d946b89674e3c993fdc6dff8c9adee104a161
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD586aa89de026dce4c369fe9315c37f19d
SHA15abf41a10415e307bdf48e06fcde467a270ca785
SHA256df856f1d427267e9bf09548348df6255be88e4abdf8adf9c7e76e078bdb636f0
SHA51292cf3de03b03b544338706e5c38b5a1fde0f3cb84eba6520f9445a218de0dff4318e748fdf9eb952f703622250fe506fc83e17977936cb9d80ec7768de70468c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580cad.TMP
Filesize48B
MD5ea173d833f44c7154579d07aadb538bf
SHA1206cd42c2d3c42f7ad67426056c088e7ce2e6e38
SHA2568247c2fdab86c21ba1dd62d83eb881c62271d7a7a1a518f0cb455adddc3695bc
SHA512e7e285aac93dc64bf92899c786ec9281eafc968469b6b59b77de6940da7e864c0f1725f30f29577deeff8a0e5777926247bd9fd1321a6b71f437bbd6bb60e705
-
Filesize
1KB
MD53dde975ddf84ddd40c5e356b20fbdc41
SHA12d1f36e13adf63c4354db3597c2c6b7148954776
SHA2562e0110a4814d3e0110e6995bf0b543cd39ca37a618b57dd3f7f9f77223cde89f
SHA512ca9d52d3087fbb9a5146c32678a4fe9ed17f94cc713529b30761a0c1900084ee5a6645daa2376a753080c98c7d991278378c5e07c13470daa8ce2e26324e3b45
-
Filesize
1KB
MD52995245f6829bfabad83a8e40580dc0f
SHA142aff3aabf55c427b4f3c1996e7daa5fee6dd147
SHA256bbe5848bd3dae1d97392aa2954e3fafb3ae4c5f4654772309572d65531cbaeed
SHA51263bb34db7760abb198bf0ed7db289f6f62953516cae06339d4588590830009d7c4c66c6021390801e807f7fa736b76c7c69c86e7bca6220a2cdba6aaee4af571
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54cdbb405493dbb372dad73f1ea61bcb3
SHA1c44d6beb4ad75b4b7a67fa860d6a1ce85c93dd72
SHA2561f2895be2e7736ac1f195965263801ffdcc2eba3c31121eb6411ec69d94c587f
SHA512e29720a2caf3bd8dd95effb6aee84f0f79e389ecc54e2b6e24ad58b33e7c613e29686c47f2a3335eb84887b5482ed7eacb60effb0ab3aa6778969482436fd158
-
Filesize
10KB
MD5be4872cdd5592455928c71924b9e5f7d
SHA17d9293c163c8e2aff37ef50fe3d1b61ecfc8d0ba
SHA256f1d20ef6e925406bc6f782e1658e0dc4a8d96d4b1bf4b6479ffd586a560b0397
SHA5124a3b048b69858bc33015051e55f11fbdeb1041e0905496f75a6d55b3f80a1ba9f37a0930e6428ef05b185c8f3f2c3ce838d666ecad97a3fb83d1822a14a054cc
-
Filesize
437KB
MD5719b51d853f1d8a5b2d704db5736bee2
SHA1b274871c8e03dd13b2c1099763b3ecb919a751b1
SHA25656112f1fb0b4cb0d81bc58c8be898ad644b8e0fc3d2beac6635c200b69321aa2
SHA512dc25f57a88e1b1edc3b36e6ac543181bb1103b392f33b2e288e86cd68ab89f232dcf7328b030543336a0a5223674a4ee6959025e0d508e85af96636c97205fa8
-
Filesize
31.6MB
MD539605e3e5a00fe66c950f740bf43a031
SHA14a43b08296ecb6b8e392e09f7609d04adaad9601
SHA2562bb93dac54dc7ccb409449ff5956d95a8383ae1399c71c645c024182e2e02061
SHA5129a48b239c678c6948cf0c6fa795bc7bfca500c4504a620989f6a5e3cc2c9c93149f66987829ba537dbc7449b5c30328fe765c7b768c80d76df22933edb0ac728
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
696KB
MD55ff8f2113356c908d9b58d930f55f210
SHA1e8b8b6e3feb904bf8e463b744f7763e172866c56
SHA2567ff818c2d6bb4329ebc91219c45807e5b96e49bca7e0960a8b71e7e03b9cec60
SHA512c407713e5155eb184bd78593bef578cbdfcb5a05be14ba3edfccf1a9af4a1cae9dee4eda1b64b96a851fc50515d58dfaaf8fa6bea063706fed17ee33fd67096d
-
Filesize
47B
MD54bda1f1b04053dcfe66e87a77b307bb1
SHA1b8b35584be24be3a8e1160f97b97b2226b38fa7d
SHA256fd475b1619675b9fb3f5cd11d448b97eddee8d1f6ddcca13ded8bc6e0caa9cf3
SHA512997cee676018076e9e4e94d61ec94d5b69b148b3152a0148e70d0be959533a13ad0bc1e8b43268f91db08b881bf5050a6d5c157d456597260a2b332a48068980
-
Filesize
109KB
MD50e05bd8b9bfcf17f142445d1f8c6561c
SHA1cf0a9f4040603008891aa0731abf89ce2403f2fb
SHA256c3ea3996241b8e9ae7db3780e470174076fd2003d8aefaa77bf0bab5e04de050
SHA51207c7865d31d22ba0c68e384afedc22261f7b3a82bebc9324145ff7f631623eca2dc31c71cdbbfc9febc1733451a095302de2a0877821a5b68038e350969bf460
-
Filesize
176KB
MD50e87879f452892b85c81071a1ddd5a2a
SHA12cf97c1a84374a6fbbd5d97fe1b432fa799c3b19
SHA2569c18836fd0b5e4b0c57cffdb74574fa5549085c3b327703dc8efe4208f4e3321
SHA51210ba68ffd9deab10a0b200707c3af9e95e27aed004f66f049d41310cb041b7618ee017219c848912d5951599208d385bcb928dd33175652101c7e5bc2e3eba5b
-
Filesize
153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37