Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2025, 03:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://suckmyballs.com
Resource
win10v2004-20250211-en
General
-
Target
http://suckmyballs.com
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Downloads MZ/PE file 5 IoCs
flow pid Process 124 4160 Process not Found 104 2796 msedge.exe 104 2796 msedge.exe 147 2796 msedge.exe 147 2796 msedge.exe -
Executes dropped EXE 3 IoCs
pid Process 4988 CryptoLocker.exe 3516 {34184A33-0407-212E-3320-09040709E2C2}.exe 3768 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 147 raw.githubusercontent.com 126 raw.githubusercontent.com 130 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4100 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 830926.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:SmartScreen:$DATA CryptoLocker.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 266261.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 4728 msedge.exe 4728 msedge.exe 932 identity_helper.exe 932 identity_helper.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2688 4728 msedge.exe 87 PID 4728 wrote to memory of 2688 4728 msedge.exe 87 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 4332 4728 msedge.exe 88 PID 4728 wrote to memory of 2796 4728 msedge.exe 89 PID 4728 wrote to memory of 2796 4728 msedge.exe 89 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90 PID 4728 wrote to memory of 3776 4728 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://suckmyballs.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa416946f8,0x7ffa41694708,0x7ffa416947182⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3908 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:788
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4988 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3516 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3768
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1688 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6204 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6668 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,3987595150347584729,17326147701020990670,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6488 /prefetch:82⤵PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkU2ODM1MjctM0U1MS00NEVFLUJCMjQtRjkwNEE2RDcxRTM1fSIgdXNlcmlkPSJ7NUI1MTFBMDItNzk0Qi00NDA4LUE0MkQtREU3NTk4RkVFNTQ4fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NzQxRDE5NjktQ0RBOS00RjhDLTg2NzMtMDM0ODUwNDdFOUJBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mjc2MjQwNDY5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4100
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD508edd5c04b02f0b7175bcda703fd0f38
SHA1d4f1968dd481ea01a4023b1ad333e16115cb0e18
SHA256afbae8fd296e93092ced684ac3683e56b28a3e809fe952fab4c9116995dfec09
SHA512474dbd8d089b549cb68585a2657486f35b8aff0b644bceca10714077c4149b84e5d910d4fda400beca016ac83620d8627d2b0ce7cac292fda7c45f3abaea1379
-
Filesize
152B
MD519a7f42782b4e728bb12731ff9a460f6
SHA1495d51f1a8fa8b55063f307f919f3bc6d67af241
SHA256126eee474c67271293ded1ff06e56bab87c21c0884d22a419fb40e4bc87cacba
SHA51250f21223f1b013c727b26327976f74faa11ec830f6d540eee02d728d9d7b9b617e0b48b63c7b9ebf248d818e5c65bd6e4007e2352f9f59e182c4625a28b28f0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5530bb78075eda1d9833eeb4f85c9dd04
SHA1fd36f2e69bfd372acc02cfa1e69d8922f81f5e51
SHA2563e167a5aa49149f087ff24aef7556a9653c202204fd548f592394dbd88378c94
SHA5121eabe2e935194b3a30f0e824fbb45de238c50dda130a71cfc98e28a1e318a96a07cba13d8c0c4d00760109d3f24bd22e4308fe6f57d26d362f6dcd4cce86bec2
-
Filesize
800B
MD5b6bc92d22bf5bb0aa05fda23ca4cfb63
SHA1819b76ee7fe66708dbe3138eada375bab92b477a
SHA2569827ca509113f3dfcce8d561e089fa4e0f11ddcb697a7270b6bface1951b8b7f
SHA512d534948ccb4b206be55bd4720f94fddc1c68965691ea133ddace0e4d46909610d6c0b36b432fbe40ab33271bef2dd43a378383ecbbd0222f495071de442b57e9
-
Filesize
800B
MD5eddbda6bc65d982fdc6158a1f454633c
SHA15d2ba256a02b12ca00da53a18502c6b403a1e497
SHA256b1a8d434212c7e010c449cb5be0fd587f0b0c06a8dee4dc6abed897c35e64a8d
SHA512b07b05dbb914fa1046a0a3255f4b8120f9287d4c8b46104d0c40f50c20c37b04ee0d162b2685c4f64b76cb0ab36ea401c27000c7a510fe6aedb8e13df2aa729f
-
Filesize
6KB
MD5635186ebc8543664c182f47679d199a1
SHA1c735c70ee0792f7bb3c0212c5e3cae5fb70af98d
SHA256c8e33f0638b08a9097bfd7e0572e2f9daaee1855ac3d7a98f0098cb83e936ffa
SHA5125240081ff39d9bfd1b949bf872cc80039cde3a87601fc0517f883f2316fdfce8babd5918fc4284960c073291b5b16903b94311be67014712df3d4cf3a3f80d82
-
Filesize
7KB
MD5a7c366b987db3d9920d4af03bc628a29
SHA1314deb8e4040ab631e7044e87c062d266a96570e
SHA2560c1100b8b97ef81c16642a67cf716e150443366cb71bd541dc5e777e202873c8
SHA512bee1ea165a0f847f0b8c3712c4877eb2b8256be9f4824d98aeacdc7750c1b70c391c8e7df0708b4c286dd4a88d3f3b25be6cb78a76d0d0f9a6ddbcc3d7bbd856
-
Filesize
8KB
MD55af2696e6765503dda83badcbb7d98b2
SHA11762b8e4bb69c71e9a55585130854c9b228c7a00
SHA25663a9bf152004b28e4f057877447f7fa896a867d0359817c8ce6da1fbf0b2333a
SHA512c85fd9922aaaad620c6af3b3df603ef17f8478e0683e0b4c6c2a951dbbd7708ab5d98571ee41f5543b5c40b443e29f0939787b36f934bee60a8f6ab20e962312
-
Filesize
7KB
MD550675a80989e9dd05e658c6cb7d3b145
SHA1173bc57b1af485720b2216d4b737098db10f4ed8
SHA256ff1722e9e1f34183736c49427fff2026dc778984454d78aa1634672deb3ab4c7
SHA51294df105c17856b148abefafded2843dd92d92e0419876c6b635faf1b0ce709cf9879033162e0ba45e0f19622ae2f5bb3c00e0da376256b325380cf38731d876c
-
Filesize
6KB
MD5c3dd58a1ff5869ba49e2e17c7d92c91b
SHA12a60bbb2cdea7a7c98ff9fd4e1137cc11ff5c337
SHA256f924c127c37e8c27965ef1199850e05ffcd649af6141627068b708ce2f8b2672
SHA51287380812a421a4d28b01e48c10664fdbc56611428379490872824359c029a3c3bb2c5f20162f31a55c7aa845564ba5af5f78d669f7c5b183cfbf73503c925a0f
-
Filesize
7KB
MD5759286709b26b043bb56055bedcc95da
SHA152d069bceda644f1bd9362cf80e9962f0077ee97
SHA25633666a4bc78677154e1210b4d34f27f6b133e9c60229ae97e4df04105c67112a
SHA512c534279ad7598d088f58423d19c0b0364db981661c1ef62257b30a053f3df24f168e97c73012f265814dd6449a60ee7eac9471620a79db99e38ed1a7a628d567
-
Filesize
6KB
MD5d3e85c3f54044bb6df81c71a6f0d7500
SHA15f73aeb9c98af608414dd0b31224754824ecd046
SHA256dfa174812750013ff5fbf50ba543c8821c6663c9f04b08991acd7b81dea49de2
SHA512167798802349002bfc1966f46640ab900ef2f35d0018a5b41c5ea607477b11f5d7d16246a92218594eff41e5255646a1b5696009b40bb43e9ad856a95d6e12d3
-
Filesize
1KB
MD55c289db79e72c313fe2c165f1ee02912
SHA198619ffbf09c8da579c797ce369e380418217013
SHA2560a36379697f852d187f3718787d9d6720c872c5e1c90145b51ec76cfd2eb70e1
SHA512bd1742b1e21609d2af51a5870488d489dcfaa3ce1e929df32c895f7e832b5c131da5c602d49d381a5ac3e67b1cb7ebf57023d78551a5d118d6e46653090c47c3
-
Filesize
1KB
MD56f77eb00ee1107ecd4ede3f9a29daf1b
SHA1531905568a6fce4a63bbccda019055573c03ea93
SHA256cb259d7005a0b058f7ec0ea9293c493c07049d06564da223646dd7ab743d535b
SHA512c2a5a585fd8a20fb784c926d2703465694d1ee36b708fafc6504eabe462b74b336b122fae541c91e234b4363b816c39b455a7a91f4eab6210301f8fe936c96e1
-
Filesize
1KB
MD5b1a2c04a3c1ca1ee27dc8090b21987c6
SHA19f82513642c12145ef6624481524b434e77f23aa
SHA256e02252d6b64991b7cf556e77c40e59f49d7e1721f102d090fecc995c98cab242
SHA512aca48e60aa1870182cd236d2fd3eff1e04efc109e0147cb44b1b9bfa0f228fae806e58f1604a50b275f1bf874356bf4003efe0dba584e4dbb1524217a0ad6ed5
-
Filesize
1KB
MD55b699c08acc9c341abae72e18c4ae9d7
SHA184f47a3f97081b6c4fc70db050c3f27ba3d97006
SHA25605fed1467cf1a0583688a675affd34e736b074da19aa5914445b8343cd1217ab
SHA51207e80da76329c80a1487f4d21e9e8fac2f03b98e4d586e8615ad6ca2f1085becd5f34719c7e3bd8809ae1c24471a08b0ac16ce4dc6d6f400088fa92514b9ec43
-
Filesize
1KB
MD58ded72136919b66006adbddb9ea0e510
SHA1172fe43e69328a9a76d827da6490cce49a8c0c09
SHA25664b9eadf6aee29a62e8645e5b035a8cea35248fdb42a4bfcd5a97a7f84477caf
SHA512d731c7e5a3634c856aafe70c083a204b6ba162bc05d70fb33ab37bd612d92e2f55e60608ec7be236601e102011932cc509cc171f17270a9c9578670069600048
-
Filesize
1KB
MD5e570c199a8c68dbd41d332820fa096e4
SHA1726e98196bad654fbb1a9f0e6781e9ae699e4c2e
SHA256c982893d1dbabe0a008ba06ecf8105353bb6adc7f40522c4c8d95c5f6318c1c6
SHA5121ba17ee576b8d0488d25ce01be1cbe01b1bbfe6666aae2b589c328f2dc4e16979e80060ad1c98fcb9f291185b1b46ddc5e8030e5ef4e6a8ff959e8e96c5674c5
-
Filesize
1KB
MD5c265704fa3a17a58860e08bc67adfed8
SHA17ec75cd50c707ae30bb08b56cb9c9c461f8dff20
SHA256bc247407dc4ff2ff72f2a8be6924920f3fe686b6512be457eef0c03ec5ff8bcf
SHA512aa9efb62c5e0fa9c894a138ba8c6583d159f7d1945343792106e533fc7a4b6ed971aaee9f1979b44714d26d225970cba79d5fdc1f1422167a384580700f735c5
-
Filesize
366B
MD54b8b55d2aa33d1f9bc1781d90d637eef
SHA16bcc816ab19ef1a147eb0349c502a3746353d912
SHA25667c3fbbec800682be8ae23935d79aa66db0b843d352a2212ad360fa2bf9d3c45
SHA5126d54c0794980457da9561a7c4b3c02eb999b988726230b2fa6b5d6ad825f4fb7eb7935857878cb20ee2c5ae083772d50a49b887024ace215a49b674d776270db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59eac35eaedf23b4212c3c9d152fa4973
SHA1dd2f1d670662fc84c1af58d3de686c24ea14a25c
SHA2564d855a95ba6b1396001bf51bf163940534d8b35723fe27fc0aa06ca0c959206a
SHA51278fee4cf1686307be1903cc25ea9fe6e95ba1ac090c617562c0ddd49a8d8bf6386a208234f0ebf27a2cb30a62007f89630753ab62284d115320fc8b8799d4c09
-
Filesize
11KB
MD5ccbc4610ff320ca8d08f363fbab59511
SHA149f350f3763028d22db7850b2aa1678354392b02
SHA25670210845d712ff939a090c4f1771b687a7108e0a7ebb39070cfe08519575a30b
SHA51221456de944065fa303900b8802e50d485a1bea98adf7a738ec5677a60bcc328d53c4cb9f893718dde058f6aef9b8eefd6f5accf35e2cffb50992840ae3cb3acc
-
Filesize
11KB
MD5a62885e91ef7c756aa1dd4cc22746a62
SHA14a068e9e6f1cb8cc248fa8e6d319f8930c93920a
SHA256cc54c1d7b6ecf0a3c9c7f44ff6360e42911bb7d4ce2558580d1cb56b633fbd0b
SHA512ad19b4f0933d7f19ea66b509064d97daf9c0d6427c4d074d982b56a74731b1aa1190fb473f5186e9e1e9f47bbc6782c9b7ab9ada4d3f31f423634835be795967
-
Filesize
224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444