Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
899s -
max time network
899s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05/01/2025, 13:00
Behavioral task
behavioral1
Sample
antivirus by emil v1.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
antivirus by emil v1.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
antivirus by emil v1.0.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
antivirus by emil v1.0.exe
-
Size
43KB
-
MD5
04b503df0753a8a4bf74035949215a47
-
SHA1
fde82e54526910d082a80853730969888d86befd
-
SHA256
81abb1776a5da5c7844a18f50a4f254eed232c6164b62e2a5fd69d4494c4b943
-
SHA512
4608a20bfb499bc6a0ca89cab7d080f76f3d7fb2c730492bfa6d7f6301bd50b24af7f228c6a1b5ac06f033c7367fb580279446407bfdad0004669dbdfeb82da2
-
SSDEEP
384:FZyd5ctOnwtOyW60GmciXEFdZBEk0z2I1zgIij+ZsNO3PlpJKkkjh/TzF7pWn3J8:PuqAwt/W6NmciXEF3p0zxuXQ/oI6+L
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
both-foundations.gl.at.ply.gg:60732
Microsoft Edge Updater
-
reg_key
Microsoft Edge Updater
-
splitter
|Hassan|
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000\Control Panel\International\Geo\Nation antivirus by emil v1.0.exe Key value queried \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdater.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update.exe MicrosoftEdgeUpdater.exe -
Executes dropped EXE 16 IoCs
pid Process 2824 MicrosoftEdgeUpdater.exe 3812 Server.exe 228 Server.exe 4472 Server.exe 4400 Server.exe 924 Server.exe 4524 Server.exe 4956 Server.exe 4032 Server.exe 1332 Server.exe 1652 Server.exe 1356 Server.exe 3472 Server.exe 4068 Server.exe 1220 Server.exe 1108 Server.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\cbbaa7c7-a24f-452d-9b23-c36a90329405.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250105130147.pma setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antivirus by emil v1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000_Classes\Local Settings MicrosoftEdgeUpdater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 4672 msedge.exe 4672 msedge.exe 4656 identity_helper.exe 4656 identity_helper.exe 4408 mspaint.exe 4408 mspaint.exe 2400 mspaint.exe 2400 mspaint.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2736 antivirus by emil v1.0.exe 2824 MicrosoftEdgeUpdater.exe 2400 mspaint.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe Token: SeIncBasePriorityPrivilege 2824 MicrosoftEdgeUpdater.exe Token: 33 2824 MicrosoftEdgeUpdater.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4672 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4408 mspaint.exe 4408 mspaint.exe 4408 mspaint.exe 4408 mspaint.exe 2400 mspaint.exe 2400 mspaint.exe 2400 mspaint.exe 2400 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2824 2736 antivirus by emil v1.0.exe 86 PID 2736 wrote to memory of 2824 2736 antivirus by emil v1.0.exe 86 PID 2736 wrote to memory of 2824 2736 antivirus by emil v1.0.exe 86 PID 2824 wrote to memory of 3568 2824 MicrosoftEdgeUpdater.exe 90 PID 2824 wrote to memory of 3568 2824 MicrosoftEdgeUpdater.exe 90 PID 2824 wrote to memory of 3568 2824 MicrosoftEdgeUpdater.exe 90 PID 2824 wrote to memory of 4672 2824 MicrosoftEdgeUpdater.exe 94 PID 2824 wrote to memory of 4672 2824 MicrosoftEdgeUpdater.exe 94 PID 4672 wrote to memory of 4008 4672 msedge.exe 95 PID 4672 wrote to memory of 4008 4672 msedge.exe 95 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 3576 4672 msedge.exe 96 PID 4672 wrote to memory of 2668 4672 msedge.exe 97 PID 4672 wrote to memory of 2668 4672 msedge.exe 97 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98 PID 4672 wrote to memory of 856 4672 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\antivirus by emil v1.0.exe"C:\Users\Admin\AppData\Local\Temp\antivirus by emil v1.0.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeUpdater.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeUpdater.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://meatspin.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7ff8b58446f8,0x7ff8b5844708,0x7ff8b58447184⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:24⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:84⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:14⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:14⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:14⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:14⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:84⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x2a8,0x2ac,0x2b0,0x284,0x2b4,0x7ff64b5c5460,0x7ff64b5c5470,0x7ff64b5c54805⤵PID:1992
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:14⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:14⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3182761675600674145,6612279660899716789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\.png"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\.png"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4400
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4956
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4032
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4068
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1220
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp/Server.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507B
MD5dd113bc063fe53dc74ead8403c979e3d
SHA1f0a5283a5d047aeb6b4b906194e5f3252b95d5e9
SHA256aebf3315c2c092e5b9bf62717e6e8ec7a8c48433a531162e35e3f1a6bde4b242
SHA512c951f5740dcfa018d92a78bcaabee5a39079beeb72041975f85ee2b01bd25e507fb9a2a2d8962196e04edf00cbe69eb235b0117056dd95476093577e537e2281
-
Filesize
152B
MD590d9cc370060ef5ae526755155220c89
SHA13d536fcef3ebde92ca496819539288686ba8528e
SHA256db4df83a39030515b39da7becb9f640e86fe6daec54296ce4fccaf9423c29e27
SHA5125179e5b0093b160b3f67fed92fb4edf97ff7439d970dce46c281cdcbf4589f157f7bcd1d8608cef03cc81258f3c0744f31b95db8c70f162bed255efad48e37b2
-
Filesize
152B
MD569cd4fbd25488dc00a347c8a390c8652
SHA122cf04f96e4af55a94c87105201f08cf7ff47aa5
SHA25623ef6c8a50cc68d03460913947c655fb7c62854cca6108e5c85cc472edcdd5cf
SHA51202ef1bcd904dcba1f0f035a61593dab52eff317762cebd59261b0d211b0b7f7447814ac5ec6c47481088761a338b6ea00a2865e759565980043b47bc4f60f5bf
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
470B
MD569e4531b2366e93cbb3ca0204a42a72a
SHA1d327fee71242ecfbf505f093cc887966b0bf8391
SHA256563d910b4d6a4e342c9eec7eb719688b7806022decd487eb81442d15e3a30179
SHA512be147645b7c1d357104fdbf1869fb7e518ddbc02f1836b076bb9c780fc358e7b44e32d86e45be8087d17aeb36f4165767131fb042ce036d88b4fbd5b2d13ec80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe598275.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD58d5a0e9fc604cf7703ae2f8f0963e12d
SHA1ee21ee96e8f66c75f5634307961b06763c0b1e30
SHA25608338b2250652f9ed42d8c8adc8d40ee3b039878b2fd3a9f325bbb6d54799aee
SHA5123415278f429f408d5fe6d65d0f6d7d43bf2c5f659635a17a1bbd500929f67191e8a2dd14fd6ca6c75a68dc3e09f07e19c00b297efb0f21103ad588104e57dbde
-
Filesize
4KB
MD502e9343b5d5aac5af77fd9d78079791a
SHA155c2ade47d2f6d21e21637eb2a15be9dbba6276a
SHA2569d28a456a97666dcf2d01ef770f5ed2f316cd9b45e9ad0649a257fcc6dbabf15
SHA512af45a6419e116576467b757cfd3c669f0d739ffcd84ad3f36ad4a7579fdf06b8601192b6ecfded826bd447f95c4ec910867d9ee396624887c70fee07755234b0
-
Filesize
5KB
MD5268cdf71885defe99862ba30cd7598cb
SHA19f1de224d94556bc6018f5f276e2d190eef21938
SHA2564c8741b3e3aa12ddd7901301db1a6ad64c68450c2d95a9008ec463f6a0518ccd
SHA512f61b1a2b1060389066fdffcd66afcc2434a4d6f356ab88a7988b984bc023bd4863bef590dbe6fa7f031eaab22c129b3fe68ed5f0ce49814d7eca61f921305e82
-
Filesize
24KB
MD52cad20898338fbc7fb993756151e2fe1
SHA1740566d988a46b18920bbb42ff71eb145a931aee
SHA2564c2f60eb2a2e891ea30a7eed7813758fb7d3200f5938e7012a22233b26b9dfa6
SHA512e1a82109629e89a57d803f1bf0433c07d01a1fcc9db30ca81eff4a415bb4f36dd772bc05272538fc0db97a20f7475f172164fbe3142d507088770a53ec1a0796
-
Filesize
24KB
MD5d8c86e7d523ce692226bc2731ee03459
SHA1a63bb7eba70e607d9557d5f59caf383b5a66161e
SHA2569c2edac30eb6825a955114fcb679842a742cbba2a06413d3976047c8f1250261
SHA512e2342039ba773cb0121540b8eb2e2b421db155384c7e48d4e40267f95759120782a905cfcdfc96931f1908f24d0d7eb5179e15e121592c3efd3e812998019f3c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5c90b8e7ca18638c8a33544962f0336e4
SHA18b4046ff4b9da724df73a88c0a43ddd0696c83b9
SHA25697c5f55113e7bdb07c94c988293a7ebf3e2f531f43dfa765ece402b055c01ae7
SHA512d9c926a103a8fb32be53910be999fd85ef0a8efd5388324a5a7e586a3008cf429a7f89515bce9c6ee07940c7dfab9af6398d1cdb426429033cc677b5e7e8b746
-
Filesize
8KB
MD5dbfa2ae79c0a4c78d3ff06d8ccefdd19
SHA1373c7566159c3d6631d0004394da02ed35a14a7b
SHA2563fdfe71f8c0aad3a6e43ef18b4ec0ec89d7fe14159830c9ea9e4d236b8d7ee78
SHA5125648a87c9aed35821163501a58fa14c1192688de399353bd32b653dfec68789970d6bb20a92fc447235c68a8d76fe3e5c60b36ea90d0c429291b218f15c7f480
-
Filesize
76KB
MD5f1ed2a0d6c1fc0e47943bd2fd7f37c5e
SHA1a1acda91022667db1af5d07a79849dcd35220e24
SHA256a28dfd7051102d4bfa464a7fa2ee0304eea3883bbf64335fd86f84e2f91d33e1
SHA512ada9c4c1042bbaa13bcc51deb37693518403b24ef426cb5c0423de7cb5f4d4c9f9473508306bd9803e1108b15f26fe262fd91adbf3b1db253873715552892ca9
-
Filesize
43KB
MD504b503df0753a8a4bf74035949215a47
SHA1fde82e54526910d082a80853730969888d86befd
SHA25681abb1776a5da5c7844a18f50a4f254eed232c6164b62e2a5fd69d4494c4b943
SHA5124608a20bfb499bc6a0ca89cab7d080f76f3d7fb2c730492bfa6d7f6301bd50b24af7f228c6a1b5ac06f033c7367fb580279446407bfdad0004669dbdfeb82da2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5cd8d7e0d036f941e94ba88f4752f62d6
SHA136ecc85ca521a6bb84bed8831f2e91483609d544
SHA2566342c747b72858b74084509bef3f919aef579dbc110ccbc9b427f98853935ebf
SHA512c21942d3256fe154f64c455d81df5b2c225259bb3f3fdae9321768179b1f3cfe5a29a4fe5f008b9e08e5294e65275f51614ab0be15a9d43fa03a8d9cd06d4dbb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5b24fb2ee1d146a15b56c4a05c77b9072
SHA12f9f9c4c8e65775e79ca980b01fd8beb8c57d93f
SHA256742b42f6bc9a2347b67dc3a23d9bde7eda8998614ba46f569ba211cf26d5461f
SHA512069f261281e9fd055462f81f9926b836e1e9b5ab5a51eaa73e240406139c6799ba9f12c097f534e6c472102a19b75546e30678b1fc894f13b83b912b481785c5
-
Filesize
1KB
MD50a7e67b2ee40952910ad9a312e6c1834
SHA1d9e9735da78b0eda5e99e4829a831976335bc2df
SHA25616c401e1fe65fbc627d6dffcc2dadd295abc9589d781a1f00c4a774bc29aff7f
SHA512a095ed45aa40f64f284b9ba15018fb69d840df9f93d46950e18389583aad29030f8274d7b49d52ffc2e35feef68c7093783a2f5c82ad1db3e497dfe7580c8afb