Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2025, 03:20
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 5228 Launcher_x64.exe -
Loads dropped DLL 1 IoCs
pid Process 5228 Launcher_x64.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5228 set thread context of 5580 5228 Launcher_x64.exe 141 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher_x64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.json OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\鰀䆟縀䆁 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.bin OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\鰀䆟縀䆁\ = "json_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell\open OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.bin\ = "bin_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\.json\ = "json_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\json_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\s OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\s\ = "bin_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\bin_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 5312 NOTEPAD.EXE 5936 NOTEPAD.EXE 6096 NOTEPAD.EXE 2600 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 1180 msedge.exe 1180 msedge.exe 2108 identity_helper.exe 2108 identity_helper.exe 5380 msedge.exe 5380 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3796 OpenWith.exe 5844 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 4300 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4300 AUDIODG.EXE Token: SeRestorePrivilege 5844 7zG.exe Token: 35 5844 7zG.exe Token: SeSecurityPrivilege 5844 7zG.exe Token: SeSecurityPrivilege 5844 7zG.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 5844 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 3796 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe 5844 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2128 1180 msedge.exe 84 PID 1180 wrote to memory of 2128 1180 msedge.exe 84 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 2980 1180 msedge.exe 85 PID 1180 wrote to memory of 3844 1180 msedge.exe 86 PID 1180 wrote to memory of 3844 1180 msedge.exe 86 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87 PID 1180 wrote to memory of 4348 1180 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/rEJgyDYR#dHS2SB2evvLHcKYuco2QDK64_5tfaEK02gxTKpbjmec1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd648846f8,0x7ffd64884708,0x7ffd648847182⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9342342172931040154,7641411053195898033,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5688
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Launcher_x64\" -spe -an -ai#7zMap23072:86:7zEvent103741⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5844
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Launcher_x64\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2600
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Launcher_x64\Other\Settings\Environment.ini1⤵
- Opens file in notepad (likely ransom note)
PID:5312
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3796 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Launcher_x64\Other\Settings\OBSettings.json2⤵
- Opens file in notepad (likely ransom note)
PID:5936
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Launcher_x64\Other\Settings\RLSettings.json1⤵
- Opens file in notepad (likely ransom note)
PID:6096
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Launcher_x64\bin\scriрts\2344.txt1⤵PID:2592
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5844 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Launcher_x64\bin\scriрts\Readme.bin2⤵PID:1228
-
-
C:\Users\Admin\Downloads\Launcher_x64\Launcher_x64.exe"C:\Users\Admin\Downloads\Launcher_x64\Launcher_x64.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
17KB
MD5950eca48e414acbe2c3b5d046dcb8521
SHA11731f264e979f18cdf08c405c7b7d32789a6fb59
SHA256c0bbe530abfce19e06697bc4358eb426e076ccdb9113e22df4a6f32085da67a2
SHA51227e55525ade4d099a6881011f6e2e0d5d3a9ca7181f4f014dc231d40b3b1907d0d437b0c44d336c25dd7b73209cd773b8563675ac260c43c7752e2d2d694d4d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5fd74930eaaef742e91ffb6f12d87995e
SHA12c347002eab13677e959c51475859ffb3f2ddd7b
SHA2566b0a6de4e34c73346262584f3323b734bcbab9b8a693bdb18d6b95fcfc08bc5a
SHA51268297afb63a29c93ce3179544a98f23e01135684415a562c313b22ecf7940b347ef9c50c74e4ab593dadd8cd18acd404002cb4f0957252bcdf9e50a31c44e964
-
Filesize
4.5MB
MD5ba962bb21b6e6532a16737851e0be8eb
SHA19b9bc702a50970da47e2b278fa6c351d468bd971
SHA25609ff48d1037af10948468033ac581968a0c6901da0e18e2cb907d29271e7861e
SHA512686cbbfef2a3cc787c38836787acda5d4d4186ab5631163f52b888c6694b5a0c8f294dcdde5bbbf2b108ab3c8ad24634bfd3c08c46f155265881c49157d455fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\000003.log
Filesize23KB
MD5c3f3b11979289261c13a553bc22fc171
SHA1708e550cb7943efb88aba3fdcf4c20bf459d2a3b
SHA256c77da4ef15bfe3bc0c974ad3ea602dd7b00744eb7f0061000425c8baed1bcec6
SHA5124580a86c09ab4a14e091ff64a8a216a7ac2d14a1decc03f6318fcaf2831d8630e54cd01b8b6e1aba898df71df11802f0ac2b297c30796964303648a5936b8ef6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\LOG.old
Filesize378B
MD5d42a4983c99715fa05a51dea23d8d6b7
SHA148b85779542824db9102053afc32ef918775ad5e
SHA256295bd74c0866724b7c2de94d513354095472e78ab33a1dd748421a932db519a9
SHA51241ed6098a84c54b47d7537b981f858b643b521dfc14810f2c84666e4acab17095b985dfa818b15e9202221f35c7d7d042f4fbfb520fb977c7d8ded8250ebbef5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\LOG.old
Filesize378B
MD53007d40e4c84464d546446600d28c2d9
SHA1f5d66f6d545e38c73e90da4e5ac275d0144ee6e9
SHA256569623ea10cbf725a2bdf0592df9bac67f595b7047573bd6c09431b4807d03ec
SHA5123e94caeecc765d81cb336343504e3f07682cb45bfa2e2a0fc3e417da58af26d88caa018d7bfb7622cee098758efa934a33a94e7b2a94746570fcd4cef1582cff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\LOG.old~RFe57c97a.TMP
Filesize337B
MD5bf01365950407f798d0e2e463ee3bd54
SHA113f41dbcf25b82745fba928f9907cc3423f3d52b
SHA25603fe568ccbc26ab6416574121b6a1bc7c9f5e3aa16c4eb4907dfa86d34a47c01
SHA5125b4f5e58ea01b2d35b7e6e0f0c7a27c4e92798a91455406d469ef4cd41e650b8a87d8ef827b81d2c2fb333a2a78e98c56a8dbf47babf5410db3fba044cd0405f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
257B
MD5ba4e2003fe7d847c86a7514b27c21c5f
SHA17dc5189fa073797ff6cec15cf7921146f4fa0ab5
SHA25616d31950c2af414b5028501c261a72b6f7f125e5e35a62ad274ea4b1bd7de92a
SHA512079550c3eed1641c8de52f55d9967e4862465835d9899fad9439580c1e66fb7cd56326be1088a8ecc10f648bcc603957c5979885909b42485733ff37b079ce5e
-
Filesize
6KB
MD5abc7954675f10afdb2bfd24d6f7af34c
SHA12fc01adf58bfdc84c1b6e0e669f799593f381f16
SHA256da65a8dc5b07227f58c0c0d3588c36b7f835138f089195c336624c216b563e76
SHA51258fc8359893fa3e43967e8d8fe31f621b346b35572f738f90bac9a5bcb8fcc25183134645da2daa0e3e47e00017ae88a946bf5df8452572615e2387b8ddd2cd1
-
Filesize
5KB
MD57b44eb7c73761117867279e9d3be49f9
SHA151af99e6aa5daab300bb3c1039616b23ec11589d
SHA256dfbac7f4ef33b3df09fc1f0eb45f7fe9caab3d26e8e1d72cc695e34d6edb12c1
SHA512fae1afb285fb88d0a4e5eaa0a4c27205163192edfdf575d9571507cca846489961cd5a07452f0bdc9464814091b916199a23307254705b1f55ece1f8668b61c2
-
Filesize
6KB
MD5a309853398af863253a58aee48c6ff5a
SHA19923a8b169e4c9c0d55bf12f638a26549c99ce4f
SHA256474fcc89c61af955fb396dd8269b7cb523e265a3599edfdea2e5d09bdeb576a2
SHA5120c647d05e6e98cced8e308028de7963b5220e949753432c5f94a2860e15b7f6f39da29f8e7debc1356e12529c5fcf70a6b5abdf1203b334421847388fb5be847
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD519552278bbfda2dfb34e3c1eff9c7a7c
SHA1fa9fb9f8980b3eee8938978bdd85b8b006f0f672
SHA25625250220cbf900e0bc8a41e94eea486c08718e62eb0946fc1d5ceefc94b73505
SHA512e2637440bcfba8bedd858d9494f64ef8bab5682beb8341735f23f7f112d6f74c7f8adf084ddda752b1bab8a78e3c634ff9360e48f71bbdc9d526ca1c949aa801
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57eb2b.TMP
Filesize48B
MD5f52b5bfcd46b117fc2aa3f5618e7ab21
SHA1e82e583419fe182342ed3b7e129d89dac328defb
SHA25640d365a9c8e774acd5c11cf971f96e3a54cc10af976e415d195cd72ff794b9f7
SHA51222aeb9cf176baddc7e8ab177511a1479faeb62528e5289fea545b1e1aeaa255656191cac3963be02aa22b1f0dbb5f6bee65300a7a69ccbfaff1057c699a7397e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5566decdc912df48c7374707695aae5b8
SHA18b9b55840d937eb5655ea0d018f35e0651731c88
SHA256321eccb577eebd4d2b91fd643051b8a8f66163dd7e707b730bd1d67911414d30
SHA512e673a34f9bb33a06c5601818619e3c8c1ad69ae573fa442749185fec9b41764eee34562f7d7470977894816adf5da8f0e0b91029181f7ad73d7eb741d4238b28
-
Filesize
10KB
MD5eaea3333c65a403ab9ec86e241bf79e6
SHA1f5b8a2a46a1d4670e6385255bbdbae6ed5b7c2e3
SHA256d7372dfd99dd9b3388185d2f301def3f9c39b5de910fe82b754a931314970ce3
SHA512f6cfa413a382363924f7112c9c7dd4d04d1b350b8b1af6fc997e059ac40df7481945e8ca91b8a5b7d6562ff82d399e4dba83611dee6ded39eb138622bf15ca05
-
Filesize
430KB
MD58b006d82dde7141147b733ddfd089f26
SHA16fe5e1863c022256b77d3007b08008a5b062322e
SHA256c0b72317627a4df9cc2e7c5edb3b823a58045e312927dba4064d27f78bb64061
SHA5124b8c200d93c0688c70c34acb35d520c76dc73a08ad1cc069ed94166d5eabcb764a254d44b75018d68aefb9738cd260ad36c150236cbcb29d76ff55fb1d742ecc
-
Filesize
693B
MD5eff856f44bbf8df26bff2bbf61a5a62d
SHA1f32c1405856ef0dbdac791a213ad4e45416f8c8a
SHA256cb63dea186e72609a066ef18f80f3fbb8a6276758f1fa20b3e9858e683cdb8e0
SHA5127aca71414e4c72e2d1cb8e8a104a78b1fa49e91fedebe1afaced5a28d6343ebe49a3edfd22c2691397e0be84209a047914f5f97148890fff9701548d7de53698
-
Filesize
1KB
MD58c0454c0b4eb0f60f45c7f699abdbb47
SHA1bdba0704b41057c5df7c311ec30fc594a72bb90c
SHA256e8871fa446cb6c5a7d8535f10492a566767bf0ce06ab452a4397e41502862074
SHA512b41f7a064613d6bdf04d8d1d7c1554d206d450a40f95f598f4ea395ec09f11cd20748fa46ff2664f9466f00cd55a252ca41f6207c0379bc06cc0152f3ddcd659
-
Filesize
1KB
MD5063e09a1695169a056852f074999f113
SHA10a2d54c4e361409b74c0bc554049f6374d4942e2
SHA2563bc8669b035fe4e3e0dffe207ffd0faf2cec29b9d1e2823e714911f90dbc2225
SHA51259b7c230a5364b3cbe6c447467b5e0651b8db059620095e0e72d6b1e427d724bc17d9d26ca27bbb542c0c7dbde341296dcff984337e65ce51bdf68b0f2832d49
-
Filesize
98B
MD531d33dbf9246b5986291436d1dbeb1d7
SHA198f9c9ea3da8d1e895efad58871280e6380c9ca3
SHA256a74ca78655aac9e0972474e5f83c8b17f8870fd6a35082f53b3a4471fd3e207c
SHA512fe866c8ea3446ce89258cf724ef431d5decfba73fab985de0dabcfe240292d3a51186f9a6a49788991d84ff83f0699a9b6157426d23c1957f24a704b4f2ffbd4
-
Filesize
9B
MD57d6f32709921ebaff9c9245c2c8f3381
SHA1ad62337af33d2c9c1be30bf5b2c52d1f03a662c3
SHA25602d18f7a9798d6063cc5ac26a0982c9f3188b0a20deff687e3f3b26f053b36d3
SHA512ed060e1452fd4abdc4dec44637829b2876c42995ba516ecd14fb685681b2c2a93b24d636ae94d5d394dc77aab95592f2a486a60c915d7757d2d2adcc8a0db401
-
Filesize
10.0MB
MD5f1c9645dbc14efddc7d8a322685f26eb
SHA18c206a1a87599f532ce68675536f0b1546900d7a
SHA256e5b844cc57f57094ea4585e235f36c78c1cd222262bb89d53c94dcb4d6b3e55d
SHA512868d3a190f2723758d1a64498a4ac1f14b0297e16e731a0eec3a446b775c65cb8428ab33140cee13ef51e7bb3764b5ff1900cfb342a3dbf3fcc41dd6cdd9fcea