Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2025, 06:55
Behavioral task
behavioral1
Sample
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
Resource
win10v2004-20250211-en
General
-
Target
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
-
Size
1.7MB
-
MD5
9bce9dae679419198574f4c9837085db
-
SHA1
62a24f1ee057e936f3bf01749ecd7e3675d0f10d
-
SHA256
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8
-
SHA512
9647610d36379a789ab45e21b1997eeff560058cf55374b0a404be9474becca566ec0dd97cbb49b8d54da811bb5fe1e4d2e3e6de9b8fd57825181d611019f467
-
SSDEEP
24576:6G5C8hr/Vz9ih9i38xVEL/QQPL6BH8kQqNgQ+uH6FqgtMok4+iL:I8hJz8eDsH8kQqNs86F1yU
Malware Config
Signatures
-
Detects Trigona ransomware 14 IoCs
resource yara_rule behavioral2/memory/608-0-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-1-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-3-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-5-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-6-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-10-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-2863-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-4519-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-5186-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-10071-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-18190-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-22872-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-24439-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/608-24440-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona -
Trigona
A ransomware first seen at the beginning of the 2022.
-
Trigona family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 35 4396 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created \??\c:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 10 IoCs
pid Process 9468 setup.exe 10472 setup.exe 10848 setup.exe 10904 setup.exe 10176 setup.exe 9332 setup.exe 10736 setup.exe 9364 setup.exe 9404 setup.exe 9236 setup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5132830EB2B933105B853B71BC8778BA = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe" df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification \??\c:\$Recycle.Bin\S-1-5-21-1318997816-2171176372-1451785247-1000\desktop.ini df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\desktop.ini df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1318997816-2171176372-1451785247-1000\desktop.ini df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created \??\c:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Common Files\System\Ole DB\sqloledb.rll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.CodePages.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-ul-phn.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\GRAPH.HXS df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\GRLEX.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\4px.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-30.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Globalization.Calendars.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-string-l1-1-0.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hu-hu\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.Annotations.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-ppd.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\TellMeExcel.nrr df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Conversion.v3.5.resources.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\STSUPLD.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreWideTile.scale-100.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\Light\IsoLeft.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationClientSideProviders.resources.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.DataIntegration.TransformDataByExample.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\mecontrol.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\LargeTile.scale-125.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\plugins\codec\libtwolame_plugin.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-60_contrast-white.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\it-IT\TabTip.exe.mui df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Fonts\private\ARIALNI.TTF df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME.txt df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebClient.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-private-l1-1-0.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\win11\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\index.win32.bundle.map df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square150x150Logo.scale-150.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.scale-200.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-24_contrast-white.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Extensions.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\MixedRealityPortalMedTile.scale-125_contrast-black.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-48_altform-unplated_contrast-white.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\mip_protection_sdk.dll setup.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\System\FM20.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\VisualElements\SmallLogoBeta.png setup.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sv-se\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.deps.json df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-string-l1-1-0.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-timezone-l1-1-0.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\gd.pak setup.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\plugins\control\libnetsync_plugin.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\162.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Windows Sidebar\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingChromeHook.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\MSO99LRES.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\130\Microsoft.AnalysisServices.AdomdClient.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\MSIPC\es\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1296 MicrosoftEdgeUpdate.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\ = "IEToEdgeBHO Class" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\ApplicationDescription = "Browse the web" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.xml\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\LocalService = "MicrosoftEdgeElevationService" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xhtml\OpenWithProgIds\MSEdgeHTM setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\Application setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\Application\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\AppId = "{628ACE20-B77A-456F-A88D-547DB6CEEDD5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\AppID = "{6d2b5079-2f0b-48dd-ab7f-97cec514d30b}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationDescription = "Browse the web" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\AppID = "{1FCBE96C-1697-43AF-9140-2897C7C69767}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\runas setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\notification_helper.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.webp\OpenWithProgids\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\runas\command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\runas setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\open\command setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ = "ie_to_edge_bho.IEToEdgeBHO" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\open\command setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.htm setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}\ = "ie_to_edge_bho" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --do-not-de-elevate --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\runas setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/html setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xml\OpenWithProgIds\MSEdgeHTM setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\EBWebView\\x64\\EmbeddedBrowserWebView.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,11" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\notification_click_helper.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.html setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 10176 setup.exe 10176 setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 9468 setup.exe Token: SeIncBasePriorityPrivilege 9468 setup.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 9712 wrote to memory of 9468 9712 MicrosoftEdge_X64_133.0.3065.59.exe 99 PID 9712 wrote to memory of 9468 9712 MicrosoftEdge_X64_133.0.3065.59.exe 99 PID 9468 wrote to memory of 10472 9468 setup.exe 100 PID 9468 wrote to memory of 10472 9468 setup.exe 100 PID 9468 wrote to memory of 10848 9468 setup.exe 101 PID 9468 wrote to memory of 10848 9468 setup.exe 101 PID 10848 wrote to memory of 10904 10848 setup.exe 102 PID 10848 wrote to memory of 10904 10848 setup.exe 102 PID 9468 wrote to memory of 10176 9468 setup.exe 103 PID 9468 wrote to memory of 10176 9468 setup.exe 103 PID 9468 wrote to memory of 9332 9468 setup.exe 104 PID 9468 wrote to memory of 9332 9468 setup.exe 104 PID 9468 wrote to memory of 9364 9468 setup.exe 105 PID 9468 wrote to memory of 9364 9468 setup.exe 105 PID 10176 wrote to memory of 10736 10176 setup.exe 106 PID 10176 wrote to memory of 10736 10176 setup.exe 106 PID 9332 wrote to memory of 9404 9332 setup.exe 107 PID 9332 wrote to memory of 9404 9332 setup.exe 107 PID 9364 wrote to memory of 9236 9364 setup.exe 108 PID 9364 wrote to memory of 9236 9364 setup.exe 108 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe"C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:608
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTM1MzY1MjkyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1296
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Suspicious use of WriteProcessMemory
PID:9712 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:9468 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff645dc6a68,0x7ff645dc6a74,0x7ff645dc6a803⤵
- Executes dropped EXE
PID:10472
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:10848 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff645dc6a68,0x7ff645dc6a74,0x7ff645dc6a804⤵
- Executes dropped EXE
PID:10904
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:10176 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff604da6a68,0x7ff604da6a74,0x7ff604da6a804⤵
- Executes dropped EXE
PID:10736
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:9332 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff604da6a68,0x7ff604da6a74,0x7ff604da6a804⤵
- Executes dropped EXE
PID:9404
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:9364 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff604da6a68,0x7ff604da6a74,0x7ff604da6a804⤵
- Executes dropped EXE
PID:9236
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:10416
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5dc5870077cfb920954e41e757c872da6
SHA1959b877a2676106230935d7ac33350d700ed7e8e
SHA2563a0975a598acb6360c47f78a51e89eb06707cd937b89da23f5c84f60ab1f63e6
SHA512d9d8b37417ca7ecae25021c9ca73f59d46df086a2efb767b0ce0e795f38d332c1a15cc149ddb1590d138e431aa7ae3cef068c15f9284c29346e092f97882b1e7
-
Filesize
12KB
MD552844afcd75c69cd5a4d198be5e356ec
SHA18a460c8a6b8d4cdb22358c02e327c5213254825f
SHA256915aa83f49373899099c7124f221b99d075f04f42f1a956c4e759aaf2638b8ae
SHA5129e8781935a977868446fc9c4512165146e24a0fa02699089e1a2ea73c1306b3c109e8ae24b1363ec419758f343b9b16d841c106decca13db88ac11b615f19874
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe
Filesize6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e
-
Filesize
280B
MD52c9a268de3a9d95cacdf4a74059fc100
SHA11bc3491f2dfb1587174f4fc0d3eecdc5850d89ab
SHA256df40944086a69c85a9e9e9a531ae4edec7a8f28f46341782fb94d9b445e3fed8
SHA512070ffdfc8a127d9d74691e66deaecd738bc2000a81f23989d7c9392d7ee0e68142531a7abc7d53105f4a2a22be4e620a0399ee9c9d1bf7f9b60308629380502d