Analysis

  • max time kernel
    782s
  • max time network
    788s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-en
  • resource tags

    arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-02-2025 00:44

General

  • Target

    MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe

  • Size

    5.3MB

  • MD5

    fbd9ad001bb2719f574c0705c5de05fb

  • SHA1

    d07e77a490ad677935ac8213b88237e94440e791

  • SHA256

    f0031f9d7f25d4d29581879f62565a5a565995899adc60213f9e218147c78593

  • SHA512

    5724e3f858ae7ea92ba4ce325f3f8f4b90ecc6d7c19476e2888c4b09f0913463191b977f71314300918cceb0a6ae0b80e29d3c70891e8aeb9314da233a929e96

  • SSDEEP

    98304:oeZOuRuvqAgef1ndGaX6tJJQv2FKA75OpVclc02vDRZTEB:1ZOPNdo3u0jc02vVZoB

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
    "C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\nemu-downloader.exe
      C:\Users\Admin\AppData\Local\Temp\7z828D13B8\nemu-downloader.exe
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3336
      • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\ColaBoxChecker.exe
        "C:\Users\Admin\AppData\Local\Temp\7z828D13B8\ColaBoxChecker.exe" checker /baseboard
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:492
      • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe
        "C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe"
        3⤵
        • Executes dropped EXE
        PID:1548
      • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe
        "C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe"
        3⤵
        • Executes dropped EXE
        PID:4972
      • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe
        "C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe"
        3⤵
        • Executes dropped EXE
        PID:3456
      • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\MuMuDownloader.exe
        "C:\Users\Admin\AppData\Local\Temp\7z828D13B8\MuMuDownloader.exe" --log="C:\Users\Admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49906 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=3336
        3⤵
        • Downloads MZ/PE file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mumuglobal.com/problem/q58/?lang=en
        3⤵
          PID:3720
        • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\7z.exe
          "C:\Users\Admin\AppData\Local\Temp\7z828D13B8\7z.exe" a -tzip "C:\Users\Admin\AppData\Local\Temp\nemux.zip" "C:\Users\Admin\AppData\Local\Temp\nemux"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2764
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4780,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:14
      1⤵
        PID:4596
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGluc3RhbGxkYXRldGltZT0iMTczODk1NjY0MSIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI5MjY4NjIxMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU0NzA1NDAyNzIiLz48L2FwcD48L3JlcXVlc3Q-
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:4680
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "2300" "1284" "1192" "1288" "0" "0" "0" "0" "0" "0" "0" "0"
        1⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2508
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RTIxODhEQ0ItOEI3Qy00Q0I3LTkwQTEtREI2NzI3NkJGNTI0fSIgdXNlcmlkPSJ7QTYwQUQ2NEQtRjBFQi00MDNBLTlCMjAtNEEwODQzRTEwMkUyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntDNzlENDIwQS1GOTZBLTQ5MjgtQTFGRS1GMTNBODY4RUIzMTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSIxMzIuMC4yOTU3LjE0MCIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGluc3RhbGxkYXRldGltZT0iMTczODk1NjE2MiI-PGV2ZW50IGV2ZW50dHlwZT0iMzIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjQiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU1MTkxNDgyNjkiLz48L2FwcD48L3JlcXVlc3Q-
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:4084
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RTIxODhEQ0ItOEI3Qy00Q0I3LTkwQTEtREI2NzI3NkJGNTI0fSIgdXNlcmlkPSJ7QTYwQUQ2NEQtRjBFQi00MDNBLTlCMjAtNEEwODQzRTEwMkUyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFMDg3NTAxOC01OTU3LTQzNTUtOEM1NC0xQUE0NURFQzA1NkV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMiIgY29ob3J0PSJycmZAMC4wOCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIzIiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9Ins2RkJBQTk1RC1FM0UzLTQwRkEtQUVCNS0wRUIwMjZENjY4QTB9Ii8-PC9hcHA-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-PHBpbmcgcj0iMyIgcmQ9IjY2MTIiIHBpbmdfZnJlc2huZXNzPSJ7MkIyOUY3QkItN0QwRS00MzVDLUEyQjAtQTU2NzNEQkQwRjhFfSIvPjwvYXBwPjwvcmVxdWVzdD4
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:2568
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4264,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:14
        1⤵
          PID:4800
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=3960,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=3860 /prefetch:14
          1⤵
            PID:1400
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=3992,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:14
            1⤵
              PID:1296
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5320,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4540 /prefetch:14
              1⤵
                PID:2832
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4180,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4528 /prefetch:14
                1⤵
                  PID:1360
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=3896,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=3892 /prefetch:14
                  1⤵
                    PID:2168
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4192,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=3984 /prefetch:14
                    1⤵
                      PID:4044
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2420,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=1016 /prefetch:14
                      1⤵
                        PID:4312
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5436,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:14
                        1⤵
                          PID:236
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5272,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:14
                          1⤵
                            PID:944
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --always-read-main-dll --field-trial-handle=5532,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:1
                            1⤵
                              PID:3884
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --always-read-main-dll --field-trial-handle=5536,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5664 /prefetch:1
                              1⤵
                                PID:768
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --string-annotations --always-read-main-dll --field-trial-handle=5976,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=4520 /prefetch:14
                                1⤵
                                  PID:4036
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --always-read-main-dll --field-trial-handle=6376,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6428 /prefetch:1
                                  1⤵
                                    PID:3360
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                    1⤵
                                      PID:4776
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --always-read-main-dll --field-trial-handle=6416,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5684 /prefetch:1
                                      1⤵
                                        PID:4040
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
                                        1⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3824
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=en-US --service-sandbox-type=utility --string-annotations --always-read-main-dll --field-trial-handle=6092,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:14
                                        1⤵
                                          PID:1996
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=4532,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:14
                                          1⤵
                                            PID:3680
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --string-annotations --always-read-main-dll --field-trial-handle=5392,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5472 /prefetch:14
                                            1⤵
                                              PID:3392
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --always-read-main-dll --field-trial-handle=6308,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6728 /prefetch:1
                                              1⤵
                                                PID:2764
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --always-read-main-dll --field-trial-handle=6916,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6972 /prefetch:1
                                                1⤵
                                                  PID:5008
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --always-read-main-dll --field-trial-handle=5736,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6612 /prefetch:1
                                                  1⤵
                                                    PID:3820
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --always-read-main-dll --field-trial-handle=6924,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=7068 /prefetch:1
                                                    1⤵
                                                      PID:4576
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --always-read-main-dll --field-trial-handle=5344,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6840 /prefetch:1
                                                      1⤵
                                                        PID:1500
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --always-read-main-dll --field-trial-handle=7232,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:1
                                                        1⤵
                                                          PID:1920
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --always-read-main-dll --field-trial-handle=5064,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=6848 /prefetch:1
                                                          1⤵
                                                            PID:1400
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --string-annotations --always-read-main-dll --field-trial-handle=7416,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=7308 /prefetch:14
                                                            1⤵
                                                              PID:3236
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --always-read-main-dll --field-trial-handle=7184,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=7708 /prefetch:1
                                                              1⤵
                                                                PID:2848
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=5384,i,17394881999235493197,375395482888283323,262144 --variations-seed-version --mojo-platform-channel-handle=7592 /prefetch:14
                                                                1⤵
                                                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                • NTFS ADS
                                                                PID:4116
                                                              • C:\Users\Admin\Downloads\mlt.exe
                                                                "C:\Users\Admin\Downloads\mlt.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:972
                                                              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                                                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                                                1⤵
                                                                • Modifies registry class
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:432

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                                Filesize

                                                                364KB

                                                                MD5

                                                                17ab67a0cc004610e46543ace04f2f0b

                                                                SHA1

                                                                927d790cf0450060afbe3442de2224c830f3241a

                                                                SHA256

                                                                46b98e8226d9726c5295796d59133fe21b13927a14bd54afd90c3323c53e4f74

                                                                SHA512

                                                                37fd93decc4fa5d85c3cc01591016a5acdb62d311251daede4fc001af7e55bb355d492fc216302b59acaefca44d64a51880f0ae74804becfb47053c3f1a5264f

                                                              • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                                Filesize

                                                                325KB

                                                                MD5

                                                                70c52df8571d6c25e41a9ada31ec808a

                                                                SHA1

                                                                da833179312400a714c3f59c2fdd07888a964c48

                                                                SHA256

                                                                af11751f39caaf585c1dc8597472ecfaab3a7f3263b33866fb39986e960d1507

                                                                SHA512

                                                                46c8b3e17613b60e83092fa50aceb89a786af6edb8d985aad24bc94b02d46437e98802303eac6fac94a048b0e43ce731210aa938c6c91735354e7899be7ef8d4

                                                              • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                                Filesize

                                                                351KB

                                                                MD5

                                                                68925c06b45982df23ae21bd1cd7d406

                                                                SHA1

                                                                97200555d160f199df8a0c303f741deefe7ee999

                                                                SHA256

                                                                e6bcb8f2c60fcbd0a523295fedaa6ce7492b3b9a20bc312a84fa24f5c61fac5a

                                                                SHA512

                                                                8910966841b1b0a4a84831df74a5aa067e9d63d9d920b589c1289c9f53e948fcc719297a94453f7d92328f6697cd31afaadca7b0221da43617242a5c21ec1c54

                                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                                Filesize

                                                                23KB

                                                                MD5

                                                                006dead6c67be4893f5ab155dae9d998

                                                                SHA1

                                                                cb71fb8238f9d5cef9ad3c2e3ee9773c7da58240

                                                                SHA256

                                                                9c9d80670959d71db499c93d6ca91c6fb24af8f81d7331b95c19c7560e5a39ae

                                                                SHA512

                                                                4e51f2544e5236fce6252dc3f272cd2e32645d70c1543dd287facce37227547ad9e404513b75efd5e4498af7382647ad4d38c5f79c74ebe30585364aa1ff0b44

                                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                                Filesize

                                                                23KB

                                                                MD5

                                                                e71fb4caa0f46369fd7f09d391ca9b4c

                                                                SHA1

                                                                7ece591a3cebc976e87d07aba5c81d10596d665b

                                                                SHA256

                                                                82a9098536c24a6bdf4912828067d809d5639c2c05c023924baf7038046690b3

                                                                SHA512

                                                                39ad4be1545634584d2dabae8af87303f6d97808948a20cb006feaedb5347f20b917e00c3268c39de19eae05e2af9d19eb1aa8cbc972e44cf1666bf866261af4

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\7z.dll

                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                0ffa2bff9e56e6122aec80d3c1119d83

                                                                SHA1

                                                                09b7eb124b8c83469ae7de6447d1b8a7f5c98c61

                                                                SHA256

                                                                609cba3a8704aa6f5e2623858402bc048de7198a3567a53183bf97de091a3e48

                                                                SHA512

                                                                42522bf850156577de397e527b8515b1bf0bdeceb170efae71d87c39a25c72c155a2fec6a88b5c3ae443752046f8840cd8afac9c42ed7bcf67aeb9e78aeb5f2e

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\7z.exe

                                                                Filesize

                                                                292KB

                                                                MD5

                                                                97b382235264f18a53eff8e891997920

                                                                SHA1

                                                                cc0f3ad9411f54f70a2b1a1705e24048b06ea65c

                                                                SHA256

                                                                bf42783c293279c65b00e4f8b72be39e1cb0fcbe14d6679151b0d5e27fd8572d

                                                                SHA512

                                                                1e780698dbc0963ccbd73976da6898b3c0dc4b4e655a80563585518abd37a1a5561a980d035123011213a83c76320de6c08541caa71bfd6582eb93ff57672a83

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\ColaBoxChecker.exe

                                                                Filesize

                                                                4.0MB

                                                                MD5

                                                                839708e3f96cf055436fa08d6205263c

                                                                SHA1

                                                                a4579f8cb6b80fe3fd50099794f63eb51be3292f

                                                                SHA256

                                                                1373c5d006a5dbcd9b86cfff9a37616f1245d1333c4adcefc7cd18926b98d752

                                                                SHA512

                                                                ece67e031e06a0442d935e7d81d0eed57ae92b348b5d104423577478ce226e4a4bde834c54e31d33bfe6f574fb7798ba96886d9e8edb738edee6e7c9c43054cd

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\HyperVChecker.exe

                                                                Filesize

                                                                117KB

                                                                MD5

                                                                dbd84c6083e4badf4741d95ba3c9b5f8

                                                                SHA1

                                                                4a555adf8e0459bfd1145d9bd8d91b3fff94aad0

                                                                SHA256

                                                                9ff467bc5a1c377102d25da9fa9c24dcc4375f456510f71584f0714fdfb2af39

                                                                SHA512

                                                                fb5fe74f64254609e07d6642acf904562bb905cd7c14c6f85ba31bcdbaf06686c0586609ec4f5d2f8f55ff90334dcbb774a3a6e78df74bf1b1d0cd03dec21870

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\MuMuDownloader.exe

                                                                Filesize

                                                                5.7MB

                                                                MD5

                                                                2f3d77b4f587f956e9987598b0a218eb

                                                                SHA1

                                                                c067432f3282438b367a10f6b0bc0466319e34e9

                                                                SHA256

                                                                2f980c56d81f42ba47dc871a04406976dc490ded522131ce9a2e35c40ca8616e

                                                                SHA512

                                                                a63afc6d708e3b974f147a2d27d90689d8743acd53d60ad0f81a3ab54dfa851d73bcb869d1e476035abc5e234479812730285c0826a2c3da62f39715e315f221

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\baseboard

                                                                Filesize

                                                                114B

                                                                MD5

                                                                9970d822966c9dc2dbb93e2c85b3233b

                                                                SHA1

                                                                79d5e2f82fa8588f22be8f67f3dfba04b6020bf1

                                                                SHA256

                                                                9bd7eb5488c11341b742afce604de4e7d5101fe2b2b85f326386012971cd218a

                                                                SHA512

                                                                a9bf65b3b47f59e5d79e7f6b42cf289da73d250005eb04990294e45a64cd65bd0b7137f3bdf0b4328790ff08f5c85b18fad09163dc594b0c83b88ff1a0114da4

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\config.ini

                                                                Filesize

                                                                346B

                                                                MD5

                                                                d00fb4c61a255b58ff09886c6c72461b

                                                                SHA1

                                                                4e4f7d7ae36f67a4d6fc8479f8400b3eb769e978

                                                                SHA256

                                                                77dec4d79e1e844a2156f101defc0fc81c138a989e8ba1c722c58feb91b3cd4a

                                                                SHA512

                                                                8494ab9fe0594f3ff7b0893ca3e25d6d0a706e546e92c5b662aa864affcefe5f9721a6a95f37f40cdacf39d27a23e2b3cd5dbca4d7b8909cd7c186209d4b46db

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\nemu-downloader.exe

                                                                Filesize

                                                                3.2MB

                                                                MD5

                                                                cdf8047ceae80d9cd9eb798a57bf6084

                                                                SHA1

                                                                8e7971401fada3099aed61849745fda37e1c0d32

                                                                SHA256

                                                                1f01a9abac64fae72e0a253ad9ffe2d62cd2967c1c2bc90fb956ac446fe2b11e

                                                                SHA512

                                                                ac366f38f39b935110192d1355147392ced5a21966cc22386804356dce24b2da7971a6a60d675689f93d74014d961bfb3b0c13cf06809b9f9feef580045e20dc

                                                              • C:\Users\Admin\AppData\Local\Temp\7z828D13B8\skin.zip

                                                                Filesize

                                                                509KB

                                                                MD5

                                                                ecb43530caf9566c1b76d5af8d2097f1

                                                                SHA1

                                                                34562ada66cd1501fcb7411a1e1d86729fd7fdc0

                                                                SHA256

                                                                a12381f97aee2d91568f44b23e866ccc99f0ae5e5961f318ed24b72f4f5da80a

                                                                SHA512

                                                                4a243c0bc4dbaf892bee91ea7eff9e6a7732d3aa2df5bebd9a4bea2859a30a8511945ce3bb823f7ef921f2e1a98906fb676fce85f25fd5908646b3a2f5d02563

                                                              • C:\Users\Admin\Downloads\mlt.exe

                                                                Filesize

                                                                104KB

                                                                MD5

                                                                bce79cfcc38930d905ec5bd8c6f4c2d7

                                                                SHA1

                                                                d02a73a0dc2293e57561597f4bc182bb556df89f

                                                                SHA256

                                                                2a8258bdecfbca4953cc5c4f64bee659d1d557decb2a3580ed70b91649460b75

                                                                SHA512

                                                                9a28f6596b65e189d519b17057e7a3fa4a791679166cd9fe4a4cde2bcb68b73127239deac50cba84bec0449f292fc43c4e74a88fedd8e5c77c5466067b222597

                                                              • memory/972-159-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                Filesize

                                                                116KB

                                                              • memory/1456-90-0x0000000000F20000-0x00000000014D5000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/1456-151-0x0000000000F20000-0x00000000014D5000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/1456-142-0x0000000000F20000-0x00000000014D5000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/1456-92-0x0000000000F20000-0x00000000014D5000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/1456-83-0x0000000000F20000-0x00000000014D5000-memory.dmp

                                                                Filesize

                                                                5.7MB