Overview
overview
10Static
static
10Malware-1-...30.exe
windows11-21h2-x64
10Malware-1-...40.exe
windows11-21h2-x64
10Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-.../5.exe
windows11-21h2-x64
10Malware-1-...91.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
7Malware-1-...ad.exe
windows11-21h2-x64
3Malware-1-...ti.exe
windows11-21h2-x64
5Malware-1-...an.bat
windows11-21h2-x64
7Malware-1-...an.exe
windows11-21h2-x64
5Malware-1-...ve.bat
windows11-21h2-x64
7Malware-1-...ve.exe
windows11-21h2-x64
6Malware-1-...ya.exe
windows11-21h2-x64
Malware-1-...re.exe
windows11-21h2-x64
10Malware-1-...ry.exe
windows11-21h2-x64
10Malware-1-...ck.exe
windows11-21h2-x64
3Malware-1-...he.exe
windows11-21h2-x64
10Malware-1-...op.exe
windows11-21h2-x64
7Malware-1-...rb.exe
windows11-21h2-x64
10Malware-1-...ue.exe
windows11-21h2-x64
1Malware-1-...ng.exe
windows11-21h2-x64
6Malware-1-...kt.bat
windows11-21h2-x64
7Malware-1-...o3.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
10Malware-1-.../m.exe
windows11-21h2-x64
Malware-1-...o3.exe
windows11-21h2-x64
9Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-...nf.exe
windows11-21h2-x64
10Malware-1-.../o.exe
windows11-21h2-x64
3Malware-1-...B8.exe
windows11-21h2-x64
10Malware-1-...ig.exe
windows11-21h2-x64
10Malware-1-...rv.exe
windows11-21h2-x64
10Analysis
-
max time kernel
895s -
max time network
897s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-01-2025 13:33
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2887140.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/32.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/5.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/96591.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/Amadey.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/Download.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Illuminati.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win11-20241023-en
Behavioral task
behavioral13
Sample
Malware-1-master/Petya.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Malware-1-master/Software.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/WannaCry.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/apache.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win11-20241023-en
Behavioral task
behavioral19
Sample
Malware-1-master/crb.exe
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Malware-1-master/eternalblue.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/fear.png.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/getr3kt.bat
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/iimo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/jey.exe
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/m.exe
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/mo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/mo332.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mysqlconf.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/o.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/qOA7iZJcoB8.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/rig.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
Malware-1-master/sserv.exe
Resource
win11-20241007-en
General
-
Target
Malware-1-master/butterflyondesktop.exe
-
Size
2.8MB
-
MD5
1535aa21451192109b86be9bcc7c4345
-
SHA1
1af211c686c4d4bf0239ed6620358a19691cf88c
-
SHA256
4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
-
SHA512
1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
SSDEEP
49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4824 butterflyondesktop.tmp 1652 ButterflyOnDesktop.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Run\ButterflyOnDesktop butterflyondesktop.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Butterfly on Desktop\is-CL02I.tmp butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-8P1K9.tmp butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-T52J4.tmp butterflyondesktop.tmp File opened for modification C:\Program Files (x86)\Butterfly on Desktop\unins000.dat butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\unins000.dat butterflyondesktop.tmp File created C:\Program Files (x86)\Butterfly on Desktop\is-41IC2.tmp butterflyondesktop.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butterflyondesktop.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ButterflyOnDesktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butterflyondesktop.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 988 msedge.exe 988 msedge.exe 3608 msedge.exe 3608 msedge.exe 3516 msedge.exe 3516 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4824 butterflyondesktop.tmp 1652 ButterflyOnDesktop.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1652 ButterflyOnDesktop.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4824 4016 butterflyondesktop.exe 77 PID 4016 wrote to memory of 4824 4016 butterflyondesktop.exe 77 PID 4016 wrote to memory of 4824 4016 butterflyondesktop.exe 77 PID 4824 wrote to memory of 1652 4824 butterflyondesktop.tmp 78 PID 4824 wrote to memory of 1652 4824 butterflyondesktop.tmp 78 PID 4824 wrote to memory of 1652 4824 butterflyondesktop.tmp 78 PID 4824 wrote to memory of 3608 4824 butterflyondesktop.tmp 79 PID 4824 wrote to memory of 3608 4824 butterflyondesktop.tmp 79 PID 3608 wrote to memory of 2272 3608 msedge.exe 80 PID 3608 wrote to memory of 2272 3608 msedge.exe 80 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 5032 3608 msedge.exe 81 PID 3608 wrote to memory of 988 3608 msedge.exe 82 PID 3608 wrote to memory of 988 3608 msedge.exe 82 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83 PID 3608 wrote to memory of 1144 3608 msedge.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\butterflyondesktop.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\butterflyondesktop.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\is-TMC56.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-TMC56.tmp\butterflyondesktop.tmp" /SL5="$70224,2719719,54272,C:\Users\Admin\AppData\Local\Temp\Malware-1-master\butterflyondesktop.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffd662e3cb8,0x7ffd662e3cc8,0x7ffd662e3cd84⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:24⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:84⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:14⤵PID:260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:14⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:14⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:14⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:14⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:14⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:14⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:14⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:14⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,4532098942493212996,7481552273828857844,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD581aab57e0ef37ddff02d0106ced6b91e
SHA16e3895b350ef1545902bd23e7162dfce4c64e029
SHA256a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287
SHA512a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717
-
Filesize
152B
MD57bed1eca5620a49f52232fd55246d09a
SHA1e429d9d401099a1917a6fb31ab2cf65fcee22030
SHA25649c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e
SHA512afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8
-
Filesize
152B
MD55431d6602455a6db6e087223dd47f600
SHA127255756dfecd4e0afe4f1185e7708a3d07dea6e
SHA2567502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763
SHA512868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5508fa9cbf27fca3549bc5a4b23606430
SHA16ac71827797ee3f4b7ad74efb15f623ad2dac1e8
SHA2567b5929162df4699bdb47107e78c5d3cc23fa86d6edee7562191ca2ecd39d63c3
SHA5120c20a9355f071b103f31e14ebc89ef89960a873570f3b6981962bb495321e8854a5d37f9bcf4c2afe256289a01e59a33722562313f3bcac873d60b930b5a177f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD58923d24da53a383e19957df3f168d806
SHA13a2d3b7047d5726455ba94a2fe5c15f957adbe7d
SHA256bd1fd1eac43d97e544bfd3ae17ee46d4db802224830ce9cafaf3acfd4d551ac3
SHA51289850ca096d136aacd41cc3fbd07f2a11512a178a2eea11a6430e25d885da7441af3ae9b17f76d2b349309b1f5cc15a02698ff64f07b8fde69185d9e1b433cc7
-
Filesize
1002B
MD5724a3b0c84320607bd6a9e3f4ec99c8a
SHA1ab7188fa0d89a2008d41845afe93624767854533
SHA25673475e0c00b3bdfa7bab0ea33ea83039150a7c14e2d7dd09bad39463506f99d4
SHA51251b2663f6a146634352d614c29cf30fe5d5958a705f0fdcb6fc3d1187ff355b1dfc666742419cf646f128a6eb1c93e863acfb460f4bfc2477ac684079be80544
-
Filesize
4KB
MD5678c353996fe907f71a37259df430a84
SHA19b3eb704ec1ccb4a6aeec921701341ca0f8ebe0a
SHA2565be90d5e1d5a6cf0f909e009ffd6c472afe9768a41bcdbd41b9c3bebd8aea932
SHA5123a58fb7b8519ccd60a66a68f5115cd9682e6db01ae00a67b13f762f72587dce6f54dd0e9e44f59a96e1d72b3fe7994244b57868f9f17ead3c2a8a375f62fcdf1
-
Filesize
7KB
MD5373be0477264c689f9a69026c41648f2
SHA1c0025a10e38f0cb062b56cf872884214bf4ce3d7
SHA256352c12efa6d87054b5f87a35dda88e103a4d26da82cb53fba6701fec89699c50
SHA5126e0f150454421a73e2e59a130383c3a24167bf81660627ffca621e021295ea631ec57c834505a0836c9c3de73739341ba2174bdfaa83ab08354519999259d110
-
Filesize
5KB
MD598d9d7c59216e7c1cfbecc618223d44e
SHA14e987efdbf8da044a56bb6cb3a8ded9fc4cb5e33
SHA2568198a189520277ff348f6ed0b1fb1df44eaafcabb0465b5e6e7a6d5a3b29f294
SHA5122bc9e845157f4d78ba221baa9bda5d4e445b941f2c3b3a55df2ff0919fb0f753a32794662cf1116834a84baae0243338982fccc2f3f0f39dc2bfc4d211cbe07d
-
Filesize
6KB
MD5620c94f042adfdcaa2e593147a601505
SHA194bb35a7695d0ca9a9d8a61d429910f93ac286a2
SHA2561e7f1d9ece0ca3a48dbd4a923c6b574c9af775a8b0f1ba30618d9f156898abc4
SHA512f4150e4038cf0b30890cf6c8ed3a85b83e22dabcf524c3dc59196ba96ae2ff7c4d92d102f96151ada3ce7f89cba8bae7cc0d25e663a57c8618f458a4f7c96afa
-
Filesize
539B
MD54698231f3d5712de746aab5986cbfce1
SHA1f7d91b67593c855cd478ce2ac91bb1f8a0e0d6d5
SHA2568a6f545ea005dc6cc0352497d0b5571d469e02e8be05aa7ee6a9d9bcd6ec6239
SHA5120c1bd011b38d0ac29af9a5592d5f07863b7d9901aa48c888fad3d02211732741ada81998d73ca08b1274f8e70c1b63b126247109f6d8e5c8ea60356858348db3
-
Filesize
539B
MD512f6998f8e1c9770f057c5b003c23a67
SHA19f72198f3978c5d91e8d0cca43b2108f17b264c6
SHA2562c9c7db785677feba72e353b606097ec3ea2b916d568a23161b0bc6cc56101f1
SHA5122b9e67e80850490cf54f52c70c229265626b37dd778732e4e2c7c8112cbe315e6eadc63e0d8abd8315a95522c4f225ed9af15e370387cb00c4a95b5ecea6c485
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54ad9312c7558ac731381e48ad2227278
SHA1639064aad3f0789763c9d288a4b3126c0306682a
SHA256c2b1b9c7f081f952659310c19bbf5cc8d8642e0666ed8f21065cb1d972ca1dec
SHA512b544b2e1c9a59208bbe15fda358fa5ccbe69e322f3fbc4c2d105da72358e7407e008f6b7c451341345e9a9124c6565a3a12e7301714252e3a5cfa7c38491f3da
-
Filesize
10KB
MD558a2a02a006f1f5c37a23ffd0883e291
SHA1068ce967550aa41d2ad0fe82c6604010a1633108
SHA2564681fea1db1ce18167d8c2ceb2e93c4ab28ed0b61dfed2a8fd05a22f71aa09cb
SHA512f003faa4d99a63ad43f73fa8af644c07290e8ba8bff49ee50504de25c46397e4ffa4e6559c961c8bceccb189ad1baf21db5ee935c1e8640f7a060bed9e967b42
-
Filesize
10KB
MD536aca03e69cd84c08ca7c5a89cba6ad5
SHA1fe9ca2cdc8cd3215b8a737defe211d5754fd56d9
SHA256380eb417242c62bcbfb7133d9f6444c98f22397a9a16aa791c163c0ac512ead6
SHA512cd60c694a82d4bd2b9f7f1e5c28a245abef610a8338c88cf072f6c7184fad32376c615503824d1a8b080017ab379b8bb4ba0ee10681fcba14c18d5626486c9bc
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891