Analysis
-
max time kernel
210s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 09:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2261.mediafire.com/zfahioe1u45gQVC7qUC5WRoIsSH-7oxekpiIzspVaT4NRy_CJ11FtI409DQuw62B-8Gkzr0cqqcWF4wVJ_b5IUBQ4HxgjbyYzcnSmuPp8PLmfCz4fT7bQd4dt6bycHuCx0v8JV_jLjPZvTnHINBOzi9iLR0PwhpJU17ofifwbrg25kk/jgvv6smyn19cphg/lnstalI_Offi%D1%81ial_6.1.1.rar
Resource
win10v2004-20241007-en
General
-
Target
https://download2261.mediafire.com/zfahioe1u45gQVC7qUC5WRoIsSH-7oxekpiIzspVaT4NRy_CJ11FtI409DQuw62B-8Gkzr0cqqcWF4wVJ_b5IUBQ4HxgjbyYzcnSmuPp8PLmfCz4fT7bQd4dt6bycHuCx0v8JV_jLjPZvTnHINBOzi9iLR0PwhpJU17ofifwbrg25kk/jgvv6smyn19cphg/lnstalI_Offi%D1%81ial_6.1.1.rar
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://nonstopshawk.cyou/api
Extracted
lumma
https://nonstopshawk.cyou/api
Signatures
-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE 1 IoCs
pid Process 220 Se-up.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Se-up.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1860 msedge.exe 1860 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 5236 msedge.exe 5236 msedge.exe 5236 msedge.exe 5236 msedge.exe 5520 msedge.exe 5520 msedge.exe 220 Se-up.exe 220 Se-up.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5008 7zG.exe Token: 35 5008 7zG.exe Token: SeSecurityPrivilege 5008 7zG.exe Token: SeSecurityPrivilege 5008 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1208 OpenWith.exe 1208 OpenWith.exe 1208 OpenWith.exe 1208 OpenWith.exe 1208 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1212 1860 msedge.exe 83 PID 1860 wrote to memory of 1212 1860 msedge.exe 83 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 3580 1860 msedge.exe 84 PID 1860 wrote to memory of 1720 1860 msedge.exe 85 PID 1860 wrote to memory of 1720 1860 msedge.exe 85 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86 PID 1860 wrote to memory of 1540 1860 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://download2261.mediafire.com/zfahioe1u45gQVC7qUC5WRoIsSH-7oxekpiIzspVaT4NRy_CJ11FtI409DQuw62B-8Gkzr0cqqcWF4wVJ_b5IUBQ4HxgjbyYzcnSmuPp8PLmfCz4fT7bQd4dt6bycHuCx0v8JV_jLjPZvTnHINBOzi9iLR0PwhpJU17ofifwbrg25kk/jgvv6smyn19cphg/lnstalI_Offi%D1%81ial_6.1.1.rar1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc44f46f8,0x7ffbc44f4708,0x7ffbc44f47182⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6636 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7164 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,6486522702606499303,12155604107474560869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:5720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5632
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1208
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\lnstalI_Offiсial_6.1.1\" -ad -an -ai#7zMap13797:106:7zEvent221141⤵
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\Users\Admin\Downloads\lnstalI_Offiсial_6.1.1\Se-up.exe"C:\Users\Admin\Downloads\lnstalI_Offiсial_6.1.1\Se-up.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD5878f727b92920f35ea84a7a7c93391d7
SHA1e3d2fb45562fe56dc0003ca98551db04cf5fc4f0
SHA2565f65f355a387337edd871f6d9b4bf67b6267b7f41a6c2529181631ce6a2af2c7
SHA5121e33ea54907be32cf017a3ea3a89b2a8b17e6cf64da3e99288ab44d01ea021b3e77a0282391c3df1ecd7f113bb24107ef73d72b68f3145a44dfcec7a5c7e110d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f6c694d5c53c57e7cf219be1fdb05c2d
SHA14c2a82f183dec5fb3ecd2d6bed6694739ffd11a5
SHA25699521fa5820b010d9f796916eba7abeb71994d6a5389ecb3b2e094cced38d909
SHA5121a3d19a5985e0331c47faa98302d20d24d5e0f5155dd1a0e83420087e56f4635b89f8f776291cc56a6fc703408f7ded97497d7ae20b0de5845f1e073a418f69b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5671e3abae74d0382c1c4f282a3edf00a
SHA1dd3ebeab91b9b5cfd64320192291f40a0a0e502b
SHA2563491f7d8e7e861c98df4df566649a67f0d9367e6f54cde3ba372291a362ce54d
SHA512d3b20d0b03f16744568714d0df025592320fd41efd0da40b363cb3b70d4108a6d0f1f47d6e99beda4d91c303fa7bdc2b6035573a171ecd17a04015552b339889
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e411c1dd1f9f456098b16c76e796dbc4
SHA1e1ab0980711f10c196a8d1d4799d7be7b4fbe0ee
SHA25638677acdd25ab19903c90caafefe105154a698e5c8fc48fb3ea651ae669552ea
SHA512b0a33487bff883799e07646c57c994e9112f23554a8e3238eaf1bd14f5ec25ccca77e8a070d88f8ed90820080fe6424674f733c6e0765b68b326313da5d5656e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD50a96b39dc074ca132243d8af4e53741d
SHA1b5fb27ffec2ac57582c571da14aa135544c70d2b
SHA2568c264ff8697f23ab913f571fe70afe3f6b645e361545ff46f404e28d0b41957d
SHA512bce75760a633d1ffb30e18bd937d2672689762d3a82dbbe57743a795453f492440de0a4551bd7ad54130c2d2201b482d154e80081cfde6e67680bafce3555d78
-
Filesize
5KB
MD550f25dc6bd2ab2ab7e41411f77107579
SHA17b1bb4d6cc1570dcbb063068eeec0e10a7850ada
SHA2567e48b0003ea7b55ab5888d93f83f3e2f76416ca3cb658b6233848df227818d78
SHA5127f615e12da8b8903d40415e3200216aad06a9baf63eb710bf387e05038cdc39d6d10d0a6012dc8419d79f32cfb61df49699e20aa818a1961dea6a5ed470d6ccc
-
Filesize
5KB
MD519d94d107a0d2066dbb516bc16fabecd
SHA1d14ed7817a826cef6d63eb9d460273fe86764464
SHA256efc0213118f047ca5ff78e6d9a3a4d182bc9a645c4c05cc5041a6e83d6f1389c
SHA51290ddf6153fbc6e198ee6cf82cf69e332825a2337d60c60e79bec1b2491075fee1942ce991a0142a535608954dc77dcc956c506c9ef02f251fedee7f6eb8c584d
-
Filesize
5KB
MD5bb88e011e33d7fb2989d9baccd0cf050
SHA1bd275f596a5e649399eea1747f0acad13a8b21d4
SHA2567dd7f31e833e49f35d93c57d5457b1f590c8192140473374d2bf09c1a030ade1
SHA512aca59c303f04dc154ad8cc9e9f03771f6ef3d8965fe7793dc5844664d176d6d1cc5e27e43ad78d2d7683e529ee1b4c680e3cfb652b0ff1b6661d08a6657aef55
-
Filesize
9KB
MD5eef2890cd5b362fe99478ff0b78fbafa
SHA10d8c6aa77df6e52ff8e16fd841a406adcb999b3a
SHA256c86548d30ebfeb42ada055756b1da772f777749060a46c5f89e1d18a2e916a86
SHA512469eef23be72890a4f8ceb349bf48c70c512c39d2f67416b58b990facd2f32b3ad19efb5f7db93658fddff1d96d6afd4b9480cb902926018646c3d61bb0e2a6a
-
Filesize
8KB
MD58b141a03a3abe386ba65e21fe3268eca
SHA1799041624c28bad27ff85e2ee1bdd5f3291272de
SHA25608b6b6074ce951cf9c6236d27857c7a0ee2d2d5fc17293aac498a4db7b2ccb2a
SHA51218b6cb6315dbd4889e8a851c1e604ec4cea15f132708dd7644426476a6a3e45da9b484e5720df0910bb131bed6b2bc455abdc97a8264b4d4c512590d51c5c078
-
Filesize
5KB
MD5b19f7165e3245fbb5b1adbcbb7ed4dcc
SHA15827aae4fc1d77d9b5478dbe93bedee67e00fff5
SHA2566768dd96d57bf53e10732dd14cd58d0ba3d416f34de62750e6e3cbff4ddb3fc1
SHA512a021cce6810c6371782d7528fdff8727d2c2d80e05a5c060485e7299f12983af809ca47de2cde5fd659d857851fbf117092d3b71ca18dc18ebdf839134d18212
-
Filesize
7KB
MD5b9765c35f19c5c5d18ed1a913c7644b8
SHA164ba6603bc547dccb9efe9698521b1fbab99bd08
SHA2560f6bf28706397865e46b5a9ddad1f5a6b284075cc35f2480c0ba194dabe4175c
SHA5128e47a8bd47f8b0cc2d3a44a17c4e4b429811f14454167a49baa1024fe4031c3d58d4ab739f9d4deb81804aac780e5aac6b003ab7bb6de08469d70ee72d2b087d
-
Filesize
8KB
MD5129f641326fb4d4b70afaa45f6e940e2
SHA10ae8632909b4ce75cc9da92be26ae53bab80a734
SHA25637d5cbc2a717e619e09daa3263c383f780a78f8b68b2062b2960de59b4edada6
SHA512fef35b0a5f2f4da747f02b779a6ef0e872b26418ff4cc3ec059675c08a79571d6b8a8b4933f5369aa6bd16849cc3235c7480952e3b4a73678aae6be5d22ef61c
-
Filesize
7KB
MD5e14c521850c66ad2d5df72a710fcadb9
SHA1a651a900df86be7f04696a51ea5aaf4da9aa949b
SHA256136431f15a8ee46ce16706a097639a254ecdd66ba75d519990f0c42e38b6bb48
SHA512f546c5092d50436b67a6e4e35e9fbf3cc337949965cc1bcfd2bda7065c22ec06fe27df5822e82f0a9c3a0de26131fdd2fb773d74a254e5a3b2e2fb7d5f373f05
-
Filesize
1KB
MD599972421c7cf0ff6309e9238e3605da5
SHA1d62d27cf6dfe567578af696dd41363358bbbd61f
SHA256eb1c840bd98f8ae64899b3bbf4afea2511fa10eb55e3df7137141466864bf024
SHA5125a7b9c05ba4f69c6ad4bcf7e2d05cc0006d658e283c4c82180f2b381a69f3757fa6aec7226d0b801d1ff543f3971a2408fbd376d7d4eb1929d88fc303a49c151
-
Filesize
874B
MD5e7d0fc16cbe14a582c4046c7f2c94408
SHA1253538d90f97e9ef0af7e42ec61647dc6768539a
SHA2565dc7c11966c8aacfce495d4db7561f8dd3e85ea17e0f2c2d5e052799d65e4371
SHA51299329576b043311f7372831e07c7c7f2d789ef6540c6ebc04a75683e712879ccc67984a25dd1294248a542f724bf42b5674180fc3294017620f1d1862dd21f8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fd58660d22e66ecf63508b0596845f1b
SHA1603b393ded44547ce4a8cefe25e374fed1f854cc
SHA25665ae53a009f8e0271fb8f403a8e91e15f8f9ca8a79c1f958c4f1220cdf3e1bf8
SHA512facc020385d43cbbad46c762a3255630213d4b29afd3b1ea0b4684f574c1c9bc0b5af3b08f17649fda686497255160d74e3341e8b9462027470422511b032631
-
Filesize
11KB
MD5ad557e786bdbc1bc43828ff19ffbc5a9
SHA1a11936d548b01e0d5b65d8bc35983a4429eee75e
SHA256ed8e1328ce142854172423c77b0d9385a7ab239d2a2922d33e19e74efb8457e4
SHA512910cac423d51b183b794182afeb0351765cb625524c16753cbbb57a7093559efe23b29ed4f180f69f0e4073843dddca285fa3177c860e4e1e6df111ac2850eb8
-
Filesize
10KB
MD55556291e07f76f71cd177757883e457c
SHA1e55fe23526bf7a30173231e2cd69c5628b7a2337
SHA256df64afaf82ce1d7f30b7b9531b03bc2fb8eadb407bd8e71b187db6b5250445a7
SHA512fcf674e26e8f49aab23e0a3a8bd31da29138fbb64b06fc0d5b68c857bbf5743f165e977c77116e2ce4ca3d27dcd0687202018133ddc3384a475d62da5d2e1717
-
Filesize
10KB
MD564174296003ece659e52762fb80ad940
SHA101fc3c2533c9e9130d2ab0c6bb28b567b7ebaf09
SHA256d48be523c8e65e41e2999fdeef354a10058238fe684716e2bef89dea3c082ac8
SHA512440c9c91a3808fa6cba98eb28877856f85813f7e3d3b9bd7d038043dccbd653fa9941009d1182335c4740a7d6b2bb706bb6638a9a7f30d5aab60b31eb8a78491