Overview
overview
10Static
static
10Malware-1-...30.exe
windows7-x64
10Malware-1-...30.exe
windows10-2004-x64
10Malware-1-...40.exe
windows7-x64
10Malware-1-...40.exe
windows10-2004-x64
10Malware-1-...32.exe
windows7-x64
10Malware-1-...32.exe
windows10-2004-x64
10Malware-1-.../5.exe
windows7-x64
10Malware-1-.../5.exe
windows10-2004-x64
10Malware-1-...91.exe
windows7-x64
10Malware-1-...91.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows7-x64
7Malware-1-...ey.exe
windows10-2004-x64
7Malware-1-...ad.exe
windows7-x64
3Malware-1-...ad.exe
windows10-2004-x64
3Malware-1-...ve.bat
windows7-x64
7Malware-1-...ve.bat
windows10-2004-x64
7Malware-1-...ve.exe
windows7-x64
6Malware-1-...ve.exe
windows10-2004-x64
7Malware-1-...ya.exe
windows7-x64
6Malware-1-...ya.exe
windows10-2004-x64
Malware-1-...re.exe
windows7-x64
10Malware-1-...re.exe
windows10-2004-x64
10Malware-1-...ry.exe
windows7-x64
10Malware-1-...ry.exe
windows10-2004-x64
10Malware-1-...ue.exe
windows7-x64
3Malware-1-...ue.exe
windows10-2004-x64
1Malware-1-...kt.bat
windows7-x64
7Malware-1-...kt.bat
windows10-2004-x64
Malware-1-...o3.exe
windows7-x64
Malware-1-...o3.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows7-x64
10Malware-1-...ey.exe
windows10-2004-x64
10Resubmissions
17-01-2025 20:14
250117-yz7h3s1qfw 1017-01-2025 20:12
250117-yy9l2sslcr 1017-01-2025 17:25
250117-vy9p9sxpez 1017-01-2025 17:21
250117-vw8eesyjfp 1017-01-2025 14:16
250117-rk9ass1rhk 1017-01-2025 14:12
250117-rhv1ds1lds 1016-01-2025 12:52
250116-p4et7a1mez 1016-01-2025 12:50
250116-p29xjssjep 10Analysis
-
max time kernel
98s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 14:16
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Malware-1-master/2530.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/2887140.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Malware-1-master/2887140.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/32.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Malware-1-master/32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Malware-1-master/5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/96591.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Malware-1-master/96591.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/Amadey.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Malware-1-master/Amadey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/Download.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Malware-1-master/Download.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/Petya.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Malware-1-master/Petya.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/Software.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Malware-1-master/Software.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/WannaCry.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Malware-1-master/WannaCry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/eternalblue.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Malware-1-master/eternalblue.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/getr3kt.bat
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Malware-1-master/getr3kt.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/iimo3.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Malware-1-master/iimo3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/jey.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Malware-1-master/jey.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Malware-1-master/getr3kt.bat
-
Size
13KB
-
MD5
4e2a7f369378a76d1df4d8c448f712af
-
SHA1
1192b4d01254a8704e6d6ae17dc2ec28a7ad5a49
-
SHA256
5e2cd213ff47b7657abd9167c38ffd8b53c13261fe22adddea92b5a2d9e320ad
-
SHA512
90e6eedca424e2ee37c78e0c0380db490c049b0378541812734c134510c40c6e4c48c4e213f395339ed99ff337ef087b6056ac5aafb246c1789ca6082dcabd2e
-
SSDEEP
192:AOyUySl0UaDz2gWsIzlmj+BxZ3yqueWQx0lZicyC8Sh31xcjBzyxwn7AVhllz3:AVODaDSHMql3yqlxy5L1xcjwrlz3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation MEMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation MEMZ.exe -
Executes dropped EXE 7 IoCs
pid Process 1916 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 2660 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 4100 MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4312 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe 4068 MEMZ.exe 4068 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 960 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 4068 MEMZ.exe 4068 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 960 MEMZ.exe 960 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe 4068 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 960 MEMZ.exe 1932 MEMZ.exe 1932 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4868 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4868 taskmgr.exe Token: SeSystemProfilePrivilege 4868 taskmgr.exe Token: SeCreateGlobalPrivilege 4868 taskmgr.exe Token: SeShutdownPrivilege 4068 MEMZ.exe Token: SeShutdownPrivilege 960 MEMZ.exe Token: SeShutdownPrivilege 2660 MEMZ.exe Token: SeShutdownPrivilege 4312 MEMZ.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe 4868 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4100 MEMZ.exe 2660 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 4312 MEMZ.exe 4068 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 4068 MEMZ.exe 4312 MEMZ.exe 4068 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 4312 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 960 MEMZ.exe 4068 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 960 MEMZ.exe 4068 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 960 MEMZ.exe 4068 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 4068 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 2660 MEMZ.exe 4312 MEMZ.exe 4068 MEMZ.exe 960 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 4068 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe 4312 MEMZ.exe 4312 MEMZ.exe 2660 MEMZ.exe 960 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1132 3028 cmd.exe 83 PID 3028 wrote to memory of 1132 3028 cmd.exe 83 PID 3028 wrote to memory of 1916 3028 cmd.exe 84 PID 3028 wrote to memory of 1916 3028 cmd.exe 84 PID 3028 wrote to memory of 1916 3028 cmd.exe 84 PID 1916 wrote to memory of 4312 1916 MEMZ.exe 98 PID 1916 wrote to memory of 4312 1916 MEMZ.exe 98 PID 1916 wrote to memory of 4312 1916 MEMZ.exe 98 PID 1916 wrote to memory of 1932 1916 MEMZ.exe 99 PID 1916 wrote to memory of 1932 1916 MEMZ.exe 99 PID 1916 wrote to memory of 1932 1916 MEMZ.exe 99 PID 1916 wrote to memory of 2660 1916 MEMZ.exe 100 PID 1916 wrote to memory of 2660 1916 MEMZ.exe 100 PID 1916 wrote to memory of 2660 1916 MEMZ.exe 100 PID 1916 wrote to memory of 4068 1916 MEMZ.exe 101 PID 1916 wrote to memory of 4068 1916 MEMZ.exe 101 PID 1916 wrote to memory of 4068 1916 MEMZ.exe 101 PID 1916 wrote to memory of 960 1916 MEMZ.exe 102 PID 1916 wrote to memory of 960 1916 MEMZ.exe 102 PID 1916 wrote to memory of 960 1916 MEMZ.exe 102 PID 1916 wrote to memory of 4100 1916 MEMZ.exe 103 PID 1916 wrote to memory of 4100 1916 MEMZ.exe 103 PID 1916 wrote to memory of 4100 1916 MEMZ.exe 103 PID 4100 wrote to memory of 3812 4100 MEMZ.exe 106 PID 4100 wrote to memory of 3812 4100 MEMZ.exe 106 PID 4100 wrote to memory of 3812 4100 MEMZ.exe 106 PID 4100 wrote to memory of 2496 4100 MEMZ.exe 110 PID 4100 wrote to memory of 2496 4100 MEMZ.exe 110 PID 2496 wrote to memory of 1220 2496 msedge.exe 111 PID 2496 wrote to memory of 1220 2496 msedge.exe 111 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112 PID 2496 wrote to memory of 2500 2496 msedge.exe 112
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\getr3kt.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\cscript.execscript x.js2⤵PID:1132
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4068
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:960
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main3⤵
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=facebook+hacking+tool+free+download+no+virus+working+20164⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb7fea46f8,0x7ffb7fea4708,0x7ffb7fea47185⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:25⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:35⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:85⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:15⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:15⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:15⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:15⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:15⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:15⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 /prefetch:85⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 /prefetch:85⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:15⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:15⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:15⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6451470719575919449,11313599152937415180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:15⤵PID:1632
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=half+life+3+release+date4⤵PID:2848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb7fea46f8,0x7ffb7fea4708,0x7ffb7fea47185⤵PID:4292
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
144B
MD5fe410a62307809c05b4a2e15207bd920
SHA1c4ff255eac8b184083b73a072a57e07d6dad0f75
SHA256b19ede9d386f2b15355fb582555703cb1301a41d95fd4a04d169c1c6df2b72ab
SHA51217c1123f6c059d2463756de6f9bd771b59d43598d6c4be9074e0258e1212d4fb54b46b7a599ed5d887942c8586a036b723a0e0b8c39ba8a62b47c7ea36629cec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f23c78497bb11ed96d53d02c24412bff
SHA10d822e89f0580d75e97c86336b343b0bc79e4565
SHA256bffe1ae9d9ab25598f686e09b9b0cbc1101eec827fba0e17b101e1a7e513fbc8
SHA512a9c97f392985f9fda36b706d4e9aec365cd6034b8b20b35601a893b32318223e9810829b15940bf2faed8701aae791896a62be3083d357431ff5f789c476d6c8
-
Filesize
6KB
MD502776cfcd05c478239b0cfe3a6a5efed
SHA1abda8ccde2cd5fbcd834abdf9bc343132155f952
SHA256b2f8ce875708e13df09df8b353b112c4ed14bb48618d43ac699936d2cd786a33
SHA512757cf892106abce06eb55c0ec103d099f2b1d30988bf22d7dc2cc388857821b2363f4d0691cdbe980ca955f25c5addded581403106eb4f1df91276a8a84f5bee
-
Filesize
5KB
MD58a4cd12463ddc3770566f48c6de1eccf
SHA111965356a65a0c76b78ea7e582b714be77d69d3d
SHA25667175026f7d8e365ca12a1019dd09ff9a343380b4b892cb7d9a90f76097469db
SHA51217b98be1bff184ac682a3e8cb171bc79ee8eb6d7623c55dde7730ed0db0030554c92e86e90907186178e28b2d69a338b6c438644412ea369c7ee32a78f578df8
-
Filesize
6KB
MD5d5a24c5406fc562cf81cfcfb05b49db3
SHA1ae3f6e1bb4b85d39bc6ed65885062d3d9d98011c
SHA256b5de22ca58e6729730049200968cc88eca5b0b3e86f158b7ac99719e181742a4
SHA5120fe45b884eccfb6956516332c75ccb826b0ce1513f00922d6b550dae5d52408f9e8c49fa93f13f0e07b4080916db049a8f96df9e565b321cfe7500968427ea1e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c29b0f444eefc3dc7d8c8182302f9f3e
SHA1e46439ff795849b84deef998941f2c5ed5befaf2
SHA256f0c931f0b83499476af79b0cde97f3ba8aa5f29b64fba266e33622be0f4f7cdc
SHA5127a46ae364bf73d8a8a0f189fb16cdbdc7e58b15106806642892cd1e8502a2e08d78e2e0dac8e9130ef1ab9dd284c0a654cb1d0e7f7acf8a6935b2aefbfb91e05
-
Filesize
11KB
MD51882f3dd051e401349f1af58d55b0a37
SHA16b0875f9e3164f3a9f21c1ec36748a7243515b47
SHA2563c8cea1a86f07b018e637a1ea2649d907573f78c7e4025ef7e514362d09ff6c0
SHA512fec96d873997b5c6c82a94f8796c88fc2dd38739277c517b8129277dcbda02576851f1e27bdb2fbb7255281077d5b9ba867f6dfe66bedfc859c59fdd3bbffacf
-
Filesize
4KB
MD5214f98cb6a54654a4ca5c456f16aed0a
SHA12229090d2f6a1814ba648e5b5a5ae26389cba5a0
SHA25645f18ccd8df88c127304a7855a608661b52b0ca813e87e06d87da15259c45037
SHA5125f058b05f166e2688df7b3960e135ada25bbcdfbb62a11da3cf9e70c08c51e5589a1e6ca2250318a694d27197f2c5ba1028c443831c43fba2171ca8e072e9873
-
Filesize
448B
MD58eec8704d2a7bc80b95b7460c06f4854
SHA11b34585c1fa7ec0bd0505478ac9dbb8b8d19f326
SHA256aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596
SHA512e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210
-
Filesize
8KB
MD563ee4412b95d7ad64c54b4ba673470a7
SHA11cf423c6c2c6299e68e1927305a3057af9b3ce06
SHA25644c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268
SHA5127ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7
-
Filesize
14KB
MD519dbec50735b5f2a72d4199c4e184960
SHA16fed7732f7cb6f59743795b2ab154a3676f4c822
SHA256a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
SHA512aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf