Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/01/2025, 15:20
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x001a00000002aa8a-292.dat family_umbral behavioral1/memory/2252-299-0x00000296BED10000-0x00000296BED50000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4232 powershell.exe 2112 powershell.exe 5068 powershell.exe 3744 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Slinky Injector.exe -
Executes dropped EXE 2 IoCs
pid Process 2252 Slinky Injector.exe 3976 load.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 discord.com 64 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\slinky_library.dll load.exe File created C:\Windows\System32\slinkyhook.dll load.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1588 wmic.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Slinky.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 4696 msedge.exe 4696 msedge.exe 3816 msedge.exe 3816 msedge.exe 3500 identity_helper.exe 3500 identity_helper.exe 1848 msedge.exe 1848 msedge.exe 2252 Slinky Injector.exe 2252 Slinky Injector.exe 3976 load.exe 3976 load.exe 4232 powershell.exe 4232 powershell.exe 4232 powershell.exe 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe 5068 powershell.exe 5068 powershell.exe 3976 load.exe 3976 load.exe 5068 powershell.exe 4484 powershell.exe 4484 powershell.exe 4484 powershell.exe 3976 load.exe 3976 load.exe 3744 powershell.exe 3744 powershell.exe 3744 powershell.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe 3976 load.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2252 Slinky Injector.exe Token: SeIncreaseQuotaPrivilege 2312 wmic.exe Token: SeSecurityPrivilege 2312 wmic.exe Token: SeTakeOwnershipPrivilege 2312 wmic.exe Token: SeLoadDriverPrivilege 2312 wmic.exe Token: SeSystemProfilePrivilege 2312 wmic.exe Token: SeSystemtimePrivilege 2312 wmic.exe Token: SeProfSingleProcessPrivilege 2312 wmic.exe Token: SeIncBasePriorityPrivilege 2312 wmic.exe Token: SeCreatePagefilePrivilege 2312 wmic.exe Token: SeBackupPrivilege 2312 wmic.exe Token: SeRestorePrivilege 2312 wmic.exe Token: SeShutdownPrivilege 2312 wmic.exe Token: SeDebugPrivilege 2312 wmic.exe Token: SeSystemEnvironmentPrivilege 2312 wmic.exe Token: SeRemoteShutdownPrivilege 2312 wmic.exe Token: SeUndockPrivilege 2312 wmic.exe Token: SeManageVolumePrivilege 2312 wmic.exe Token: 33 2312 wmic.exe Token: 34 2312 wmic.exe Token: 35 2312 wmic.exe Token: 36 2312 wmic.exe Token: SeIncreaseQuotaPrivilege 2312 wmic.exe Token: SeSecurityPrivilege 2312 wmic.exe Token: SeTakeOwnershipPrivilege 2312 wmic.exe Token: SeLoadDriverPrivilege 2312 wmic.exe Token: SeSystemProfilePrivilege 2312 wmic.exe Token: SeSystemtimePrivilege 2312 wmic.exe Token: SeProfSingleProcessPrivilege 2312 wmic.exe Token: SeIncBasePriorityPrivilege 2312 wmic.exe Token: SeCreatePagefilePrivilege 2312 wmic.exe Token: SeBackupPrivilege 2312 wmic.exe Token: SeRestorePrivilege 2312 wmic.exe Token: SeShutdownPrivilege 2312 wmic.exe Token: SeDebugPrivilege 2312 wmic.exe Token: SeSystemEnvironmentPrivilege 2312 wmic.exe Token: SeRemoteShutdownPrivilege 2312 wmic.exe Token: SeUndockPrivilege 2312 wmic.exe Token: SeManageVolumePrivilege 2312 wmic.exe Token: 33 2312 wmic.exe Token: 34 2312 wmic.exe Token: 35 2312 wmic.exe Token: 36 2312 wmic.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 4484 powershell.exe Token: SeIncreaseQuotaPrivilege 464 wmic.exe Token: SeSecurityPrivilege 464 wmic.exe Token: SeTakeOwnershipPrivilege 464 wmic.exe Token: SeLoadDriverPrivilege 464 wmic.exe Token: SeSystemProfilePrivilege 464 wmic.exe Token: SeSystemtimePrivilege 464 wmic.exe Token: SeProfSingleProcessPrivilege 464 wmic.exe Token: SeIncBasePriorityPrivilege 464 wmic.exe Token: SeCreatePagefilePrivilege 464 wmic.exe Token: SeBackupPrivilege 464 wmic.exe Token: SeRestorePrivilege 464 wmic.exe Token: SeShutdownPrivilege 464 wmic.exe Token: SeDebugPrivilege 464 wmic.exe Token: SeSystemEnvironmentPrivilege 464 wmic.exe Token: SeRemoteShutdownPrivilege 464 wmic.exe Token: SeUndockPrivilege 464 wmic.exe Token: SeManageVolumePrivilege 464 wmic.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 428 4696 msedge.exe 77 PID 4696 wrote to memory of 428 4696 msedge.exe 77 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 332 4696 msedge.exe 78 PID 4696 wrote to memory of 1836 4696 msedge.exe 79 PID 4696 wrote to memory of 1836 4696 msedge.exe 79 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80 PID 4696 wrote to memory of 2756 4696 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://uploadnow.io/en/share?utm_source=2rnBsBk1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8f42c3cb8,0x7ff8f42c3cc8,0x7ff8f42c3cd82⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6932 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,11359797503269153298,13093557448382102327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6564 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Slinky.zip\Slinky\load.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Slinky.zip\Slinky\load.exe"1⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\Slinky Injector.exe"C:\Users\Admin\AppData\Local\Temp\Slinky Injector.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Slinky Injector.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:3916
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Temp\load.exe"C:\Users\Admin\AppData\Local\Temp\load.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
152B
MD5c0a1774f8079fe496e694f35dfdcf8bc
SHA1da3b4b9fca9a3f81b6be5b0cd6dd700603d448d3
SHA256c041da0b90a5343ede7364ccf0428852103832c4efa8065a0cd1e8ce1ff181cb
SHA51260d9e87f8383fe3afa2c8935f0e5a842624bb24b03b2d8057e0da342b08df18cf70bf55e41fa3ae54f73bc40a274cf6393d79ae01f6a1784273a25fa2761728b
-
Filesize
152B
MD5e11c77d0fa99af6b1b282a22dcb1cf4a
SHA12593a41a6a63143d837700d01aa27b1817d17a4d
SHA256d96f9bfcc81ba66db49a3385266a631899a919ed802835e6fb6b9f7759476ea0
SHA512c8f69f503ab070a758e8e3ae57945c0172ead1894fdbfa2d853e5bb976ed3817ecc8f188eefd5092481effd4ef650788c8ff9a8d9a5ee4526f090952d7c859f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD548d41e724758c185a82870ab10f40adf
SHA151fe957d6f3082c978ce6a3ddd9dabd16fe1cd71
SHA2566161530352a1d4e318def7eb70990ed855e764e27540005eb5f94f39a1b5bf43
SHA512ee0ac71687b0f4dab1a64b64c4ef52118d74b4dabd4eabc371355365b9b9ec439e71ef683c8c83f0b16c48379d5ed23264d77dfac4450b49bbf851e0adfa2e1e
-
Filesize
2KB
MD572af01c6e9db991420026f70b56af7ea
SHA11b0fb65e6d67dbbffd76724bdbf8da743e6105a6
SHA25634bc5d4074a2af51247b50041594d4e177c1e1c839014bfd18d1addf49703a1f
SHA5129ce07a2e40aa5667fe90f7419cb2b6519a867a5fe8b9dea8e541e6ca4e5492553a833aac1ae8358d3f741146ca20cdccd62ad17ba3e0c3b700ba27feaacb68be
-
Filesize
6KB
MD57998ca3ffe46a5928ddd238c39d1d00d
SHA1287e4bc7ecefae09416dba22851aac46a27b941a
SHA256093d4a175b2933b7c33b018b51cf509ec82f83cf5f255d5a20c39018cd2dec28
SHA512d3c7a26ae587e6ee4e17d82d9580e0725c572470a33fc929947a6469363ff49606d658bc3d786ebfe32123e43815baae11d408cdd7e8a86d635ecc12603625e4
-
Filesize
5KB
MD5261e5261e24acc4a2d5e09be7242617c
SHA1a5bd482c97b1c111c59a46b7c54ff90e20adfffa
SHA256d0f8eda07b600965d7533e28a951123759dacccabe79ffbe0620d6d419f6aaee
SHA51251094ba7c19fa29c5dfa865c7800c20ebd35d2100494e0f1b9635d537c58bb2520ce07dfcba1a7c293b12e4d0e7c3bf763ba9aa1db4556119061363cfd1ba87f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5cc88de0b42ffd3d52b8cf79dfae461f3
SHA1a6862224e6bc2885917a4a04cbb2e1ec80aa8c7a
SHA2566aad5dedec6b2428c10fcdb291d5f192ba85849794c44e1e5efff2d90c0b2bcf
SHA51248d053c2e9349f084a7f85cb64e1cfeffef9df7cc74a22bed288ef882022fe103481f22eb546ba1f99d2efd542e1f982fdf06ed78ccd10deb696cb931d40e964
-
Filesize
10KB
MD502427ca6ae6dd544c463be4f37f96a31
SHA1e08e543a677f116c88a99ab1fd0c139d8813bb42
SHA256220397ded375aff9765fbec08b7253934cb9dfe5ca0359b9d31637d901dbcd2d
SHA5125833f495e05a181235d8f268a93e543498902b20526bcf56e8b2c07fad386625d562fda706d8a1a4ec02f9f996dcac2ef0d2a5dc0e4ee331be1dd1980008cea0
-
Filesize
944B
MD5d0a4a3b9a52b8fe3b019f6cd0ef3dad6
SHA1fed70ce7834c3b97edbd078eccda1e5effa527cd
SHA25621942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31
SHA5121a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b
-
Filesize
948B
MD5441a842138038e6385e430a90d7ea608
SHA17b3712d2cdd37e10ee9b3994131ee5175e920f01
SHA25647592f3324179912d3bdba336b9e75568c2c5f1a9fb37c1ba9f0db9df822164c
SHA5129dbddc3216f2a132ae3961b3aeac2c5b8828dcc9292f6c5bf1171c47453aa8687f92658818d771413492c0ea565e9ede17b9c03e427af9dc2ac21a78369a6666
-
Filesize
1KB
MD50ac871344dc49ae49f13f0f88acb4868
SHA15a073862375c7e79255bb0eab32c635b57a77f98
SHA256688f15b59a784f6f4c62554f00b5d0840d1489cef989c18126c70dfee0806d37
SHA512ace5c50303bd27998607cf34ac4322bcf5edfbd19bbb24309acf4d037b6f3f7636c7c14b6ac0b924114e036252d3a1b998951c7068f41548728fa5d92f5f9006
-
Filesize
1KB
MD5201a02fbba615c7b8004d14ada483d3e
SHA169fb4cb79c38c6755799e65d5752cc2a4e1a86f0
SHA256b4c033fe3444f280ee37a23116bf174edf584fc20a2805a04de181c2a87da6bd
SHA5126c8bbe9a3fc356637ad4c4cf7e73898be2c33723c3108919e86471bf6fcae12d4dcb6e7a532ca2baec980044fba504ee48de7c036f171b3fe655db06a52c7676
-
Filesize
228KB
MD522c66a144f89f219d9f7bef81578dd48
SHA1ad7235aadd9583fd423a5f36a5c65a6213d23fff
SHA2569c1f1a7105e258fc4b5df94ba02bd41ddbe55bc82c88cd718fa5b2fac5969f00
SHA51278316d05a92f3c4d9be0f18d1bbc86529961917d83cb00de36a396e96b2357564e354e9cfdc364f08d7e96bdd8602296e6df6eb0d2ea21029c7a45e116edb7a0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
18.4MB
MD538019371c7cfc54d0c08629da0384a1f
SHA187509b8aa5549f22b53362588c624b010cfa5b26
SHA256d4f6bfde46ea2394570619fa89f8cdc8ac00b297179fe8831558530ec48492f1
SHA51275f204fa1be253a68678ec7a6637a8db1b02346fb429365500427e493fd0c2b2d2b24a4ae30de3f777c239af507c141f979b6012c8b394f663d073f2850d682d
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
35.0MB
MD52ebeee6fab83ed93c1af34b338ec36db
SHA129b46eff62da60d049746509cc426e2fb68e23ca
SHA2564edd9310f1c4ae4349f5f46aa3e1052e54d2085c3895c43a9ce83375ac14d09e
SHA512d1dba23870e080dbef88197d7ed4c67c53ead491dd1f3158335c0aff4bfb61748c314b470ad6de41c5737eb56c261a10b0c39c6471ad7718dd2faef26c951763
-
Filesize
2KB
MD54028457913f9d08b06137643fe3e01bc
SHA1a5cb3f12beaea8194a2d3d83a62bdb8d558f5f14
SHA256289d433902418aaf62e7b96b215ece04fcbcef2457daf90f46837a4d5090da58
SHA512c8e1eef90618341bbde885fd126ece2b1911ca99d20d82f62985869ba457553b4c2bf1e841fd06dacbf27275b3b0940e5a794e1b1db0fd56440a96592362c28b