Resubmissions
14-01-2025 19:21
250114-x2ytaawqdy 1014-01-2025 19:15
250114-xybvcawpdy 1014-01-2025 19:09
250114-xtsx3aylfm 7Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
14-01-2025 19:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10ltsc2021-20250113-en
Errors
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 56 raw.githubusercontent.com 57 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a7687adb-2d37-44f7-b96b-cc4b376b800a.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250114191533.pma setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "134" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 228 msedge.exe 228 msedge.exe 1680 msedge.exe 1680 msedge.exe 1180 identity_helper.exe 1180 identity_helper.exe 2708 msedge.exe 2708 msedge.exe 3048 msedge.exe 3048 msedge.exe 3700 msedge.exe 3700 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1984 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 820 1680 msedge.exe 81 PID 1680 wrote to memory of 820 1680 msedge.exe 81 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 4696 1680 msedge.exe 82 PID 1680 wrote to memory of 228 1680 msedge.exe 83 PID 1680 wrote to memory of 228 1680 msedge.exe 83 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 PID 1680 wrote to memory of 756 1680 msedge.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffe166b46f8,0x7ffe166b4708,0x7ffe166b47182⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2332 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff658335460,0x7ff658335470,0x7ff6583354803⤵PID:3452
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14915770653330675489,11889982591021595012,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1952
-
C:\Users\Admin\Downloads\NoEscape\NoEscape.exe"C:\Users\Admin\Downloads\NoEscape\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1936
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1984
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:2076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ef0e81b130f8dcf42e80097a75e5d04d
SHA1d8694b7c5fba1ee2e73e69dd7790ca5b1cb882db
SHA256fc53158d948d1742e3f960124f9fdb138eaa4aa711d0f43833fa893247de4918
SHA512c85df1696537dfce601de46183b1b22d7f0007b0f695f1904bbd1a6e429d7787c3d6199bcecdb21936d811b35eeca57a9800bcd3a3b585569aabeb0b5b497efd
-
Filesize
152B
MD5c58ccb4da696442ae40d3db9e4b41c3f
SHA1e27933a94d57f04c75b8bff25ad7012171917f87
SHA256d0d75be801bf0c5f715665c73214bfa38fd714dd9ee846de410855d96dd75931
SHA51282a7cd39758d67f1d177ce7f46a5ee560eb60207ca7ca1e39b9a08a269ed140532bf1ec85899a033a54d20a0d59592d1cd5f5d35f71da98f6b6e35cd904e1872
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD514b5376bc7cbf2370d1c691c570b0bfb
SHA1ba04600239eaaac5bb7d5081027eec28e38eb903
SHA2569dafd515d59fdb734f72ec8ed2fad4a951ed0ef5e8e27b3b0d3f99d67e274c3d
SHA51243f87fc7d1ac64f5de50e9455c544d26d16c102a12ee189e5263d4da358af4db5574f5974d35889044261d1f8ca0adabae1d430e6c2b155d3720af8111086089
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d483fafb69c04dc4bb2c7c59ca64105c
SHA14cfca2418d2207694ba2cf6a9323a7f2d370a24a
SHA256fa3d8fd5d6cd51fadcda9fd51e2b84241f431803097e264c83e411dd2064781c
SHA512e4033dcba3444fb5a3a549a5b7b4b10670b413e3c2f7c40c68fd5af799ebb86f0aa56008b06a245fb46040081aa372c902c1a32d38399d38bb0e033f8e2d1e40
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
678B
MD5aac7c354eaaf7729c023d3470f09dd56
SHA1dcbb2397a8c4559f9e10f89317d86cd5c1f17e78
SHA2562b465bfdca42354c1b22b5473e47c07650def7ffbdd4c1a463ed1b6d42d291dd
SHA512cf3c691fe54030080445abd9a26f77a018a5de3f408ed89b998d0b171fdc801f52fabd8c4caa8be2f3b3cb97a7be50a992bf8ce9de26a59ff0530d0e32e58204
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe589af3.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD57e45a3aa1311a0f713308445cca6c2d4
SHA1780c6e2cb6ec91f5fbfd017392fb91b8c6539c17
SHA256467d6b1418bff01973dc6e9d7721307befc7b5e4a9b270a34e4a97b2cf72f4d8
SHA51252466342f73062bdf833db9e24a22a909c12c017dd129c7bba329472e7ae44dd801b848a3b1d60e56acd5e2944f3511b51059874ddf39ded63e97921e0f0d070
-
Filesize
6KB
MD5650bb0cf4ef26edb546092199a3cfc0e
SHA1a1be60b8d754dad48888859d4cade9629dc8d47e
SHA2563be46c549510379bd2385937f9f833ae29db0a0ba8867530765f0ec31279bf42
SHA51294f06cd2809f681496a56afbc5d7bc66ff6cd048fb613f53f62a2c4a917a7f709ae464be3c78b3a4235e6a4bd9f96c2cc13e6729f039e47db2971ad330823dc2
-
Filesize
5KB
MD502e74e8eccbd6aaf93fed1699c2e4394
SHA1c313871bf4ed7b1e11697d0d7328edd434ae8429
SHA256b360aa55cfd5f1cda68a34101681a92caeeabdc168760d11b7a2e673f28a3cbe
SHA512416c47a0340a422613343615f4a0090028f0317fb79b5b967109d9c8011ebdd24f5da806da7c40bf472c81ab6aa1fb56ed242737a27a1d5f394c8c15240c777b
-
Filesize
6KB
MD506a6d8c8695b96765f35a8ea860e2f69
SHA1e243ffbdbb709d1c43698b0069308d8c2fd84eee
SHA2567b8e7050cb557aaa417809ca2fcefefc0a450f543de177c0a395242229c44238
SHA5128be5ee11eaa499f3ead9d28475d7a3aae64cb3b5e189f5f4080bdacb3d3a17eef5217f43499ec9c050ae680794e33071b6f0c5c862e32ff88cd8a962932365f7
-
Filesize
24KB
MD562aee047a3c6cf2fec2a29a34157633b
SHA151b6eed704d65a62d8793ea18885d12aa39a5cf2
SHA256342e67b65a4070bbd6e7c2fbf75c98e727d9db45fa071181cae0f5eade726ddf
SHA51221ee4907a0dcf077f9233542462b8bfd01d976dc1fe4a7b7c4ad70d691e7b9101bddcc292e13fc83a22f56355aa5b93949ac124c84da1f43a80851bf313d895e
-
Filesize
24KB
MD5a18e33a424007376b810134dde07fec6
SHA13acbb4070e7fab6fea0f6c618aeca0964e39f7f8
SHA25612852fe3bc04c3a3f6cdb76d7fa37cf0d7f91ffe801c70caf5ee4f5bb34e2821
SHA5123a08afee6762546ba967965d72b90a0e0ed2a45bee0e195696c92f511c4b92634acdb669e6320359cb436e809c9672c0371042990aaf26b90da06da523ce6b9b
-
Filesize
1KB
MD5c91bdef350d6b552429add8ffb8359b1
SHA1a4d2d8b06cbe080c4b2666aa8c0fe88adb70ab84
SHA2566a2da1049caf75f385e08eda3800392e3a32bab355b358bf20eae4770be6b425
SHA5120fb991bc75a69f6d91a5b74d5fd31db63f4ff709372954da6cb3b7a3ff8907746c32c7215f12d4ee269024b43c0c34bf567bfd3c2567e29d8c056c89d94a17cb
-
Filesize
1KB
MD5759a8bc14e17eb5594ca140353150412
SHA100634aa0a6f5c7dba5d259e6e61b1f7b7ca85000
SHA256e1c9e54de971be12e03520019e1dae0c46688d221cfabc73e1bb42fa46c8da3b
SHA51200f830890657db4037668f9035d1cd9f6f5d804e4f9a04fe6ab8d1d7e8cc06b72e61bd0786e0198ef15271263930f80882d59074316f38f887d29890cc4483c6
-
Filesize
1KB
MD5c1ae8d2ec34c18a6de3319f40bad02a9
SHA1405d97a4626a79b14a8c5846e2221a02cb986d98
SHA2563fff92c3f695ef16f883c2722b58dcf9bb1f2a5d09437261414adcb0b9b343ab
SHA512ae644b44f569d53e5cfbb35062a4c43601a4c09d70b73c0db9d21712876f45b2a4ef6bd445f26e75240c1389b329560fa238f32890ad8353aa13f8c03788fa54
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD52895d67650b07820b9a7cb898b59210b
SHA17ce50b74044a37cb4c0024c9be1af9eba5fbe30b
SHA256ec0afe58275af31dd488397f65d93ebb09ec17780b8df301b6b3be7cf32d699c
SHA5125e7fe6e05423960786fb2e52e79f06d1ea10715fee87c1f4ffbdc04b56f9564740b2f2a31f87a45a208bd8a2c233cf8a57205d492dd65a1eb946e01a4595d278
-
Filesize
10KB
MD5d0f8a30cb2fa9708631804d873fab994
SHA18129512d8a52cd88e7b45c8208b402b2c045e3fe
SHA256a229c3f6310b6ae4ef473f96de1d71604861b89342b3b4daea294e239ec3584f
SHA512ce169916c1b1e9a7d6fcc7109f2389e8890c89d42ad92ad1580eb8ab09b6c77c80bda241ab14a211ff468e0f5ebbfced30c45f179388007553cc9a5b540ec9dd
-
Filesize
11KB
MD59641a4b6299ed3a9d1951ae9f0e68c4f
SHA19d95f813008ee2c694a4cad7a67329abbb799cea
SHA25669a4b6d8455e703201bc48dfcae9150ccf487397161a7736fcd4b4ab85c49d2f
SHA51277d7d9e03bbe011eb130a85572cd660d84cb1aa4a3b14b35933e429a216e600a04b771097b2b99eff9bb0737f29f1c49912053f23fa0998f8fb1c5b8471a31c3
-
Filesize
11KB
MD53c6999f63694f36b229580847bf35a97
SHA12f652b18e66b4d120fd5b73c7e9f5d6aa35a6bc9
SHA2569bc30c46804d6a99a59c02819b6bafa19566cfb2f00f8dbcae1a5db723900032
SHA512244ac0be36cca1fbb5a64f603d2f0bbcd78a4f2cfb4eb4bbe375012ead6253585f8e13f6b34e30030f72afa44284e8ed10b71dc8923c2623f5a1f6e97f8e72a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5fa4767fec10c2d9fabd2badd56c74bab
SHA16239c09a19ec74657cd1a711669208926c0dd283
SHA256e978953ac4d3f8968ace2afac0edaaa8bad32e835ff3f721b815c2eb6c7e249f
SHA5126874d6b8984203efc9498531e488d2f1d445e949ce57ea20f438119fe62427fccf87f4377dfd9bf7a3b44a25f120bf1f12af8da02d37d2c1a04c7723fe932db4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5ca92a28a19a296fbab5878ab8bb05ee0
SHA1f75e7be8a4afbdcb142f138f0f0902c55be0abcf
SHA256f7870927786c4ef88d8be609b29d5249c60aa22e4c52e3a7630b0a1bd36c5ebf
SHA512c40a64e0db8a284e1da071f8c26b780d291532030ec08dd9fd0a50df5bb527f428efd246664d9db69e8dbd45dcf78fcf92d8eac5ea14ec62ecf62212359b7428
-
Filesize
616KB
MD5ef4fdf65fc90bfda8d1d2ae6d20aff60
SHA19431227836440c78f12bfb2cb3247d59f4d4640b
SHA25647f6d3a11ffd015413ffb96432ec1f980fba5dd084990dd61a00342c5f6da7f8
SHA5126f560fa6dc34bfe508f03dabbc395d46a7b5ba9d398e03d27dbacce7451a3494fbf48ccb1234d40746ac7fe960a265776cb6474cf513adb8ccef36206a20cbe9
-
Filesize
560KB
MD544481efd4f9a861444aa0aa05421a52e
SHA122e9b061f8fc3147dd0ec8a088a38272b0d30bcf
SHA2567b8632db07cb8693963402624e6ad884187b23f81ec7968fba2631909d5919b2
SHA512819cf783345751f6fb000142b59ebac5b72c8878adfaec1c9472bf242d7a469cdf21a2d89c6e292599606f19782c1951752f763bd89efed35e1b0f2d2fd52827
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4