Resubmissions

13-02-2025 08:40

250213-kk2sdsvrdn 10

13-02-2025 07:14

250213-h2xtnavre1 10

Analysis

  • max time kernel
    835s
  • max time network
    438s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2025 08:40

General

  • Target

    e92f111b8aa01289f72c66585219861e0117c9939de56741cbb234fee55536fe.exe

  • Size

    4.4MB

  • MD5

    d3de9b47f8ff4f23db2668f8ee287139

  • SHA1

    1364d4a5afcaf3ebb147e0ff828028967800dbe3

  • SHA256

    e92f111b8aa01289f72c66585219861e0117c9939de56741cbb234fee55536fe

  • SHA512

    f6b4a2c922c007f91730eadf54b571107168977e79e31a902153fe553a9b2b4883aba44dbc149dbe4274cca4221cb6d53e8d75368818016e50eebbb6d920cf50

  • SSDEEP

    49152:5R/KpmZubPf2S8W2ILeWl+C1p9jWy5S2d0eigXulQVvZxxgHHG8ekWeGMEOy24zI:H/jtYLP1Sy5F0AGGgVyLzKlf

Malware Config

Extracted

Family

darkgate

Botnet

traf777

C2

66.42.96.199

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    BrgntNGq

  • minimum_disk

    100

  • minimum_ram

    4096

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    traf777

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Darkgate family
  • Detect DarkGate stealer 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs

    Using AutoIT for possible automate script.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92f111b8aa01289f72c66585219861e0117c9939de56741cbb234fee55536fe.exe
    "C:\Users\Admin\AppData\Local\Temp\e92f111b8aa01289f72c66585219861e0117c9939de56741cbb234fee55536fe.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:224
    • \??\c:\temp\test\Autoit3.exe
      "c:\temp\test\Autoit3.exe" c:\temp\test\script.a3x
      2⤵
      • Executes dropped EXE
      • Command and Scripting Interpreter: AutoIT
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2980
      • \??\c:\windows\SysWOW64\cmd.exe
        "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\cfkfbhc\edhhfhh
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3580
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ComputerSystem get domain
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4052
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDcyODczNjc5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:3340
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\MicrosoftEdge_X64_133.0.3065.59.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2348
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77d966a68,0x7ff77d966a74,0x7ff77d966a80
        3⤵
        • Executes dropped EXE
        PID:4792
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77d966a68,0x7ff77d966a74,0x7ff77d966a80
          4⤵
          • Executes dropped EXE
          PID:1168
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7776f6a68,0x7ff7776f6a74,0x7ff7776f6a80
          4⤵
          • Executes dropped EXE
          PID:4100
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7776f6a68,0x7ff7776f6a74,0x7ff7776f6a80
          4⤵
          • Executes dropped EXE
          PID:3172
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7776f6a68,0x7ff7776f6a74,0x7ff7776f6a80
          4⤵
          • Executes dropped EXE
          PID:3328
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:3184
    • C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe
      "C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2664
    • C:\Windows\system32\wwahost.exe
      "C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4864
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\MicrosoftEdge_X64_133.0.3065.59_132.0.2957.140.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\MicrosoftEdge_X64_133.0.3065.59_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:732
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\EDGEMITMP_6269A.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\EDGEMITMP_6269A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\MicrosoftEdge_X64_133.0.3065.59_132.0.2957.140.exe" --previous-version="132.0.2957.140" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\EDGEMITMP_6269A.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\EDGEMITMP_6269A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\EDGEMITMP_6269A.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7db4d6a68,0x7ff7db4d6a74,0x7ff7db4d6a80
          3⤵
          • Executes dropped EXE
          PID:4204
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QkVFQ0I0MTctN0VERi00M0NDLThFRUItQkU1OTg2NTQyOTRCfSIgdXNlcmlkPSJ7QjQ3MTMxNTAtNTQ3Qy00MjRELUIzQjYtQkVCRkE2NTI5MjlBfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntBOTBCRTY1QS03QTg0LTRCMUUtOUU0Ni01QzM2NEREREFDREZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE5NS40MyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjUiIGNvaG9ydD0icnJmQDAuNDIiPjx1cGRhdGVjaGVjay8-PHBpbmcgcj0iNiIgcmQ9IjY2MTIiIHBpbmdfZnJlc2huZXNzPSJ7MTI4OTUwM0YtNUM5MS00RjlFLTlFODUtNkFDMDcyQzQwMjc4fSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IjEzMy4wLjMwNjUuNTkiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iNSIgaXNfcGlubmVkX3N5c3RlbT0idHJ1ZSIgbGFzdF9sYXVuY2hfY291bnQ9IjEiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzgzNDIwNzg5NTc4ODA2MCI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTEwOTkwODg2NSIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTA5OTA4ODY1IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxMDk5MDg4NjUiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjQ2NTM3NDI2MyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMCIgZXJyb3Jjb2RlPSItMjE0NzAyMzgzOCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjYxNTA2MTE0MCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iZG8iIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzL2E0NzJlY2VjLWFlNjktNDQ5ZS1iN2EyLTRlODZkZmVlNThhOT9QMT0xNzQwMDQwODUzJmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PW1nRXZFY1FDZTklMmJXTm9MOEtadVNMRG40eGNBWUlLJTJiRFVmMWFVaFFzOUlSRVZaaSUyZm8xTTlzdnczN243dUhvc1hFakJPTVhLV01VN1g4TU1zV1lHVUFnJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMCIgdG90YWw9IjAiIGRvd25sb2FkX3RpbWVfbXM9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjYxNTA2MTE0MCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvYTQ3MmVjZWMtYWU2OS00NDllLWI3YTItNGU4NmRmZWU1OGE5P1AxPTE3NDAwNDA4NTMmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9bWdFdkVjUUNlOSUyYldOb0w4S1p1U0xEbjR4Y0FZSUslMmJEVWYxYVVoUXM5SVJFVlppJTJmbzFNOXN2dzM3bjd1SG9zWEVqQk9NWEtXTVU3WDhNTXNXWUdVQWclM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSI1ODQ5ODEyOCIgdG90YWw9IjU4NDk4MTI4IiBkb3dubG9hZF90aW1lX21zPSIxNDQwNiIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NjE1MjE3Mzk5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjY2MjMwMjk5NTYiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3NTciIHN5c3RlbV91cHRpbWVfdGlja3M9IjcxMjcyNDk4ODYiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSIyOTY5IiBkb3dubG9hZF90aW1lX21zPSIxNDk4NSIgZG93bmxvYWRlZD0iNTg0OTgxMjgiIHRvdGFsPSI1ODQ5ODEyOCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNTA0MjIiLz48cGluZyByPSI2IiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9InszRDNCODc2MS1DNTA2LTREMjAtQjQ1OS02NjM3QkUwMDY4MjN9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4776
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Installer\msedge_7z.data

      Filesize

      3KB

      MD5

      a43e9ce8d33ed6eb2b8f5133450d64dd

      SHA1

      f2b9a2eab4b80d7bef0a6e076423993b77f66332

      SHA256

      39bace95aa685a42bb379404c0e4f2a11254a7d5ab9a9b5551d311d1dbc05bb6

      SHA512

      9db1c9de9521cd7bd4af5062693d3557ab196fd552bb6000c1d4266426127c9c7c6eada263e90f99bf941fb1c863d10463940e164a03e0742ee070a35fbcdf6e

    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1AEC895B-F3D0-496B-9498-8481F6213E86}\EDGEMITMP_50553.tmp\setup.exe

      Filesize

      6.8MB

      MD5

      1b3e9c59f9c7a134ec630ada1eb76a39

      SHA1

      a7e831d392e99f3d37847dcc561dd2e017065439

      SHA256

      ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae

      SHA512

      c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e

    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{F8F18C0C-8D93-43EA-8EE1-5A1ED8985451}\EDGEMITMP_6269A.tmp\SETUP.EX_

      Filesize

      2.7MB

      MD5

      1a59a8af3c58b30ff0fe71db2196b24b

      SHA1

      6b0e5ba36f4fc5328ec494272054a50cafa13e68

      SHA256

      ba25974b29a25cb7bc1f58a0990a8ce758354aa6ec5b8b8af210f2c1466ba49d

      SHA512

      f173fe15db8d7aeef4f6fa62a41246550ccee207e6388095a5f87036362d4c95da646e1a7c68764054556e024da80b749646425076e9bfac42fb77be8f2c0355

    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

      Filesize

      3.9MB

      MD5

      ad5f7dc7ca3e67dce70c0a89c04519e0

      SHA1

      a10b03234627ca8f3f8034cd5637cda1b8246d83

      SHA256

      663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31

      SHA512

      ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51

    • C:\Program Files\msedge_installer.log

      Filesize

      108KB

      MD5

      b666e3574e0c39ccebab23f795b06f59

      SHA1

      752d151c7970cadc75d636a5be4c70851f318a06

      SHA256

      389c742ed0e5bee11a86661c1247d31544240b4bf4b255a34d0de0548ae717c0

      SHA512

      77a51674e4526209bed528ab615f835539cb2888b082acefd05440c5c7292678eccae9d9c3126c0885eae12cf4c4eff5c336d2eb8aa2f80ae99a78b802c2ec31

    • C:\Program Files\msedge_installer.log

      Filesize

      73KB

      MD5

      87cfaef860c24015d9bec8622b62492b

      SHA1

      d75d1ec6bd1108c26764edac834d6104d6642af9

      SHA256

      8f0a42fc817fc5d468ae1ccba9c3c8a4b5e7db2d0fa8405fbe0b7dcf1ee9fcf5

      SHA512

      fd48adafd9a6fa29ba55aff21e3ec3881fea29372d2010f2fd5d597a21e35bf4378dffc3e4ea1e8f973935db482a5d2b983cbf2442704af0861e2f426f26553f

    • C:\Program Files\msedge_installer.log

      Filesize

      98KB

      MD5

      112aff8b22b51bc204c76ee569d8fdab

      SHA1

      04cf2bf65c29675f1b3a23b1402745b1c09fd759

      SHA256

      3c10235d9d24dc42cd5d93e827c348e097381a5e96cb0b3a9b63d210d27a6de0

      SHA512

      d89bed50eda5612802d4174b8485e067f532aee847a568d0b5da095a0bafb7391c4bc1ed9915dd78fa0df5980502daa1c14d2eb62d57cc5ae5ff727e541ae20a

    • C:\Program Files\msedge_installer.log

      Filesize

      100KB

      MD5

      fe393bedded5721f329d45a80ad21375

      SHA1

      c6a2f509e96b3ebacefff48a5bcbb0758b7dea5d

      SHA256

      f6949b7840f4256a978ddefa87985bbebf8a39228cbb7b833e489fe82532b364

      SHA512

      c6704fba28d2e10b44cf9e6ff468245832a1b9656af1c9778f19707c0411dfe6457f6490a09fa042b6fb60aa798eef94b20d2f6001ce57ade400d851f0548013

    • C:\Program Files\msedge_installer.log

      Filesize

      100KB

      MD5

      fa444f3390f53ced4a1520db77a0b29e

      SHA1

      b095130427f6e0477f88fc16f05f2a3afccb8271

      SHA256

      86959298fa1423b8a4e6bcb27bf7b2e46a1c107c508dd5777f66ae3ba42d7e73

      SHA512

      b98dfe4f8d0c79bf3adc3655c1023f293133e45f7c1cbf8e55bdd6d590ec0dd00e86a493fae3838fe2da940283c327add8cf3db375e0f40da2951e3fb053a2f1

    • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

      Filesize

      574KB

      MD5

      04511d83d7daf21dc65993e03da2a853

      SHA1

      c388e7db951755dac3191493ae723d7c51f5daa5

      SHA256

      f45ce7bb764e3b3ed0dd787e88598faf3ad015f782be671a14e3ec1d9f406c36

      SHA512

      5cbe6d60b98da34b3426abd01fc93bd90a4abae4ae840a17e7491e0e207b76d928a02bef86afbc4bfb8b22b6d9c206f7f96fb0a1a03c7f707488931030bd0816

    • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

      Filesize

      590KB

      MD5

      8d7a5e754022d920ed637e271d7f4e71

      SHA1

      c8e410df84fdc16e4c8db5bbc3a5fdb00200a2e2

      SHA256

      8a2261da2adf207d20116cb16c709db69cd89515cdd04f4c16a495062cce2d02

      SHA512

      06ff0d92b3f653e88a54ac2e1b0c204cca63057b4074374f059c60319c44dc592cd41675e6629378873cd4013fd33bdf8bdd00d7bdb0984f119691f985b41981

    • C:\ProgramData\cfkfbhc\edhhfhh

      Filesize

      54B

      MD5

      c8bbad190eaaa9755c8dfb1573984d81

      SHA1

      17ad91294403223fde66f687450545a2bad72af5

      SHA256

      7f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac

      SHA512

      05f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df

    • C:\temp\test\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\c:\temp\test\script.a3x

      Filesize

      585KB

      MD5

      e3fa7e39a141e7d0dc4a2a32cb242468

      SHA1

      4e9e59dbe9da4c572160932a36565ae6613966e7

      SHA256

      0ae36daf17a3c56302b79d5870a0c0e20b7c6617cc80048fed4280246d7d2447

      SHA512

      47091962028dc42b84ff727b7017812a594939e53ba0f736d257a42974fbc0636232c050f877285405c4cd5c25cd44306032e42ed64a8c68a65798ef60a1c2e0

    • memory/224-12-0x0000000000400000-0x0000000000880000-memory.dmp

      Filesize

      4.5MB

    • memory/224-7-0x0000000002B80000-0x0000000004995000-memory.dmp

      Filesize

      30.1MB

    • memory/224-1-0x00000000049A0000-0x00000000067B9000-memory.dmp

      Filesize

      30.1MB

    • memory/224-0-0x0000000002970000-0x0000000002971000-memory.dmp

      Filesize

      4KB

    • memory/2664-94-0x000001C8C34B0000-0x000001C8C34B8000-memory.dmp

      Filesize

      32KB

    • memory/2664-95-0x000001C8C3800000-0x000001C8C3A49000-memory.dmp

      Filesize

      2.3MB

    • memory/2664-150-0x000001C8C3520000-0x000001C8C35B9000-memory.dmp

      Filesize

      612KB

    • memory/2664-93-0x000001C8C3480000-0x000001C8C348A000-memory.dmp

      Filesize

      40KB

    • memory/2664-92-0x000001C8A8F60000-0x000001C8A8F6E000-memory.dmp

      Filesize

      56KB

    • memory/2980-20-0x0000000004760000-0x0000000004AB5000-memory.dmp

      Filesize

      3.3MB

    • memory/2980-17-0x0000000004760000-0x0000000004AB5000-memory.dmp

      Filesize

      3.3MB

    • memory/2980-15-0x0000000001440000-0x0000000001840000-memory.dmp

      Filesize

      4.0MB