Resubmissions
09-01-2025 16:56
250109-vf7g7avmfz 1009-01-2025 16:56
250109-vf2xpsvmfw 109-01-2025 16:51
250109-vc55ysxjgp 10Analysis
-
max time kernel
199s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 16:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://malware files github
Resource
win10v2004-20241007-en
Errors
General
-
Target
http://malware files github
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "59" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 3908 msedge.exe 3908 msedge.exe 4132 identity_helper.exe 4132 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1216 3908 msedge.exe 83 PID 3908 wrote to memory of 1216 3908 msedge.exe 83 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 4356 3908 msedge.exe 84 PID 3908 wrote to memory of 2524 3908 msedge.exe 85 PID 3908 wrote to memory of 2524 3908 msedge.exe 85 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86 PID 3908 wrote to memory of 4760 3908 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://malware files github1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb566e46f8,0x7ffb566e4708,0x7ffb566e47182⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4100 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,6757869173544800609,9024550882526574689,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.zip\NoEscape.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.zip\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1104
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38e3855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1348
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5f4f24778ab5a78abc764912c8e42fc2e
SHA1a140bcdb8b81d9f454eb076bc2737e6cf4da40f0
SHA256fa629b9d6783da56305638a411d15ce7d7af7d77255bd15ca69b87fb5020d2a4
SHA51284581167ca9655b0242cf34b4435356a660adafe9cd785417b98efffe9c70d7d48be24fded12d7ef13f35a9aa2dca65fc3f9d5035bdfbee7feb19af76271496a
-
Filesize
1KB
MD5cbaf3267b2c4419a85e359d7e802864c
SHA118262289c970a5f1c1ef65fa4a88248627d5a375
SHA2562f21056fa5b247483b7a0fa2f0725a3b98ed97deced55398de88aeedeae73eb9
SHA512adbe051eb2df20d5894026cdaebc5d14d00881c78dbbba18c09da62bd6971d5cae1f77a64f8fadcf26fa54ecb64c2ec916a8a6fdcaecb494eeb88cd1cf227de4
-
Filesize
6KB
MD50ab13f797b20ec813df98b87a5cb63bc
SHA1223a3823badd647583e26a5685f5f2e52b440ed8
SHA256cfc8dba75925722c842914284abce069beeafa3cd68c0e21bbd05f9e74bd67f8
SHA512d873827ba20fb89a22d10472057fee924eefff8c79c0a4d24cf48082935f6bedba722721c5adef52c522365a7e0376f9bf581917056ab027d6a808f232a6ba9e
-
Filesize
6KB
MD5e8c4667af9cea4af27d7bca3cd97f64f
SHA19a33561ff3f8a7dcd2c30ecff6feaca11bc6fdd0
SHA256c64a564f801c7a94578464ce224bf69c10809c4a028aada50bf092488813a3bd
SHA512f04afbb0d6ced8cbf532f5c89bff65850a1843d196078025fad43e52920f5a30fd756d63beb2f05300ca61dacfa014449e86cca04e76b0269a001e8e8304d8a1
-
Filesize
5KB
MD512ddcc9ef5b2a790c1ac68d28d15dda5
SHA1a001473cfe8c1e493cff98b8a5790fe161ddd07f
SHA256ab15ee5bd21a7b66a8a61ae3318a88bd482b7e9d1dc6817cfaab5ffb1b14c9ff
SHA5127762423d0b39ea459be472bc7427cf3bc68d150f5498865b520a9a7836bcf3fe1b176ba271184d5698034c3fad288b725ec840072531480412270b7bed16c82a
-
Filesize
6KB
MD51520f83d4d91842f15816d947b08aa92
SHA1accbde3a05790a7aa87969919329390aa9557b7d
SHA256513594a08c7a7f756e284007c5063cdfaa3a54e582f73891461dd44a0c7489bf
SHA5126009b31996d53887322685a46b39fd67d072e54fd06f9532de4f8976740750a1d2a7785c8c3057c6a7380b2dc094b9683f00044e3c7442f306a1ba496ef0dbbd
-
Filesize
6KB
MD5739a74d140864b0ec2891c5a5855f645
SHA1ec2faa70d518416b68ec9fbb4b2de420f0522f51
SHA2563a59333bf78dc0e01add429c84368028fdf039c00bc3f969bde90916378bc269
SHA51298aedb1f0d6002e30891dd87720498ce474f52fa778f2602bed61e20f1fadb3b0ce142114fd1f83dc463c09c45853c642ac4b9e00b940646d178f608bb2ccbae
-
Filesize
1KB
MD56ec3e0aa6a74f3189ce2883c1f003312
SHA14e424416219408758cd3105cd097fd862c2de5c7
SHA256ed1ab5b4240eb6af20b716edeb9cb1c5a1cc32fdbd4fd442cb559e4438f83039
SHA512434e10b97847ebdaba7d684737be8b7adb5491e556f2e1f00df4acdec14a42e03b08c3644c5dfb3ada81c7e251d4ec22448dddc5fccd492c52d770953030932a
-
Filesize
1KB
MD57da133ecb781927c850b4127031d9e48
SHA14e2ad3003e7b3dd916ed45625e26c7e554061fd0
SHA256cfb3f3bb7d4f92e8991d6a2b28d47f98b543c2c4e5bd5713f3b1a688e8f27bdf
SHA5125ec542f439df4c7de3dca0e83a30f24e2350f7fc04f37c9a0ae0c2b8d6d616576c9d51efbb8ea3b3be6802a8b3bcedf0027f1ca066892959f53caeadcc1544d6
-
Filesize
538B
MD5076842e2d6d498e1f18980bf2dff82a3
SHA192ede9b5ef77bff62c58a6415ddc280b72487c60
SHA2568b428b480e4e66c315f9279c6fe518f09d41f798f71c5ff44f0067c5e367af52
SHA512eb15948d517da51b0902bd096666b1a4859da582fb1f4a98d828a7409086174d6ba827f2359679450abf1dfe083a90cfea6648dda7af4e585ba5c5c77f4ba8bc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f9651e97e7aadbba3068333f86001ef2
SHA1ef1cc5e30be342cd02de20c515493e306b86df46
SHA256acd0376cabbb5a0d13cc649e388639a32be3111c0e6435245e261a7873641c64
SHA512b0284ce3a1c95890e969bac6f278a136b28854f683bdb7f1421d35fb855f95d0de4a1a2927d57e84c7bb5ade9a9e86bd02245f532218a9aa6ba55955e9cd6dcb
-
Filesize
11KB
MD58c83926de5b88b6503c017be4de24d78
SHA17f4ca2a4da2685033978fa15f63e1ac6410ebf67
SHA2562e75be84907090750530ebf33af73a6fbc1438dba5adaef81045c97d96caef20
SHA51217e0824ffc556a3e8ca1e0f17eaa4da24db834ec4491fd614046f5043663c9e73f088bf25427c4e0e8feaa908e9a4462f0655b6d7179066d3f2af24867376edd
-
Filesize
10KB
MD58280a9e069b926776b3dcfd0e4c51721
SHA1a8762a56949432dad3c5e02450c0109d6303ddb0
SHA256b32433bf395e13fc732c5ccc4f08f77abac3020389835e6058493f4f38b4af04
SHA51216626eba18503898ae4733e8d9209ee9a8f9f4873f1fd3a4990874d5e83c62702dd9b5c4f81804dd0b4da85cbf2218121ceaeaadee48437eb9eea6041b198970
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4