Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2025, 08:13
Behavioral task
behavioral1
Sample
9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe
Resource
win10v2004-20250207-en
General
-
Target
9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe
-
Size
282KB
-
MD5
635bb56353d749a3f4b9067ee3af53b6
-
SHA1
ef3188a9c3fa65e2fd1d1dfb9051adabbcc2a50b
-
SHA256
9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581
-
SHA512
e5168bc052bdd1ca736d8eaf1e75c4298a384520a97a80c44d26b99d24ac21efbd2cb26bd4fbda04789c91edf6feedcedd747e64f99b99932bc8afa5adb2bc0e
-
SSDEEP
6144:XZw2TxWX/f48zO7gtwua+Japo5iCb8lseuxw/6YF10:JFTxWYMh5qoLb8LCy9c
Malware Config
Extracted
simda
-
dga
cihunemyror.eu
digivehusyd.eu
vofozymufok.eu
fodakyhijyv.eu
nopegymozow.eu
gatedyhavyd.eu
marytymenok.eu
jewuqyjywyv.eu
qeqinuqypoq.eu
kemocujufys.eu
rynazuqihoj.eu
lyvejujolec.eu
tucyguqaciq.eu
xuxusujenes.eu
puzutuqeqij.eu
ciliqikytec.eu
dikoniwudim.eu
vojacikigep.eu
fogeliwokih.eu
nofyjikoxex.eu
gadufiwabim.eu
masisokemep.eu
jepororyrih.eu
qetoqolusex.eu
keraborigin.eu
ryqecolijet.eu
lymylorozig.eu
tunujolavez.eu
xubifaremin.eu
puvopalywet.eu
cicaratupig.eu
dixemazufel.eu
volebatijub.eu
fokyxazolar.eu
nojuletacuf.eu
gahihezenal.eu
magofetequb.eu
jefapexytar.eu
qederepuduf.eu
kepymexihak.eu
rytuvepokuv.eu
lyruxyxaxaw.eu
tuwikypabud.eu
xuqohyxeqak.eu
pumadypyruv.eu
cinepycusaw.eu
divywysigud.eu
vocumucokaj.eu
foxivusozuc.eu
nozoxucavaq.eu
galokusemus.eu
makagucyraj.eu
jejedudupuc.eu
qegytuvufoq.eu
kefuwidijyp.eu
rydinivoloh.eu
lysovidacyx.eu
tupazivenom.eu
xutekidywyp.eu
puregivytoh.eu
ciqydofudyx.eu
dimutobihom.eu
voniqofolyt.eu
fobonobaxog.eu
novacofebyz.eu
gacezobeqon.eu
maxyjofytyt.eu
jeluganusog.eu
qekusagigyz.eu
kejitanokon.eu
ryhoqagoxyr.eu
lygananavof.eu
tufecagemyl.eu
xudylenyrob.eu
pupujeguper.eu
citifemifif.eu
dirosehijel.eu
voworemoziv.eu
foqaqehacew.eu
nomebemenid.eu
ganycyhywek.eu
mavulymupiv.eu
jecijyjudew.eu
qexofyqihid.eu
kezapyjolek.eu
ryleryqacic.eu
lykemujebeq.eu
tujybuqeqis.eu
xuguxujytej.eu
pufiluqudic.eu
cidohukigeq.eu
disafuwokis.eu
vopepukaxej.eu
fotyriwavix.eu
norumikemem.eu
gaquviwyrup.eu
mamixikusah.eu
jenokirifux.eu
qebahilojam.eu
kevedorozup.eu
rycypolavag.eu
lyxuworenuz.eu
tulimolywan.eu
xukovoruput.eu
pujoxolufag.eu
cihakotihuz.eu
digegazolan.eu
vofydatacut.eu
fodutazenaf.eu
nopiwatyqul.eu
gatonazytab.eu
maravatudur.eu
jewezexigaf.eu
qeqekepokul.eu
kemygexaxab.eu
rynudepebur.eu
lyvitexemod.eu
tucoqepyryk.eu
xuxanexusov.eu
puzecypigyw.eu
cilyzycojod.eu
dikujysozyk.eu
vojugycavov.eu
fogisysemyq.eu
nofotycywos.eu
gadaqusupyj.eu
masenucifoc.eu
jepycudijyq.eu
qetuluvolos.eu
kerijudacyj.eu
ryqofuvenoc.eu
lymosudyqym.eu
tunarivutop.eu
xubeqidudyh.eu
puvybivihox.eu
cicucifokym.eu
dixilibaxop.eu
volojifebeh.eu
fokafobeqix.eu
nojepofyren.eu
gaherobusit.eu
magymofigeg.eu
jefubonokiz.eu
qedixogazen.eu
kepolonavit.eu
rytahagemeg.eu
lyrefanyril.eu
tuwypagupeb.eu
xuquranifir.eu
pumumagojef.eu
cinivamolil.eu
divoxehaceb.eu
vocakemenir.eu
foxehehywef.eu
nozydemutik.eu
galupehudev.eu
makiwemihiw.eu
jejomejoled.eu
qegovyqaxuk.eu
kefaxyjebav.eu
rydekyqyquw.eu
lysygyjytad.eu
tupudyqusuj.eu
xutityjigac.eu
purowuqokuq.eu
ciqanukaxas.eu
dimevuwevuj.eu
vonezukemac.eu
fobykuwyruq.eu
novugukupap.eu
gaciduwifuh.eu
maxotikojax.eu
jelaqirozum.eu
qekenilacap.eu
kejycirenuh.eu
ryhuzilywax.eu
lygujirupum.eu
tufigolidat.eu
xudosorihug.eu
pupatololoz.eu
citeqotacyn.eu
dirynozebot.eu
vowucotyqyg.eu
foqilozutoz.eu
nomojatudyn.eu
ganofazigor.eu
mavasatokyf.eu
jeceraxaxol.eu
qexyqapevyb.eu
kezubaxemor.eu
rylicepyryf.eu
lykolexusol.eu
tujajepifyv.eu
xugefexojow.eu
pufepepazyd.eu
cidyrecavok.eu
disumesenyv.eu
vopibycywow.eu
fotoxysupyd.eu
noralycifok.eu
gaqehysohec.eu
mamyfycoliq.eu
jenupydaces.eu
qeburuvenij.eu
kevimudyqec.eu
rycovuvutiq.eu
lyxaxududes.eu
tulekuvigij.eu
xukyhudokex.eu
pujuduvaxim.eu
cihipifebep.eu
digowibymih.eu
vofomifyrex.eu
fodavibusim.eu
nopexifigep.eu
gatykibojig.eu
marugofazez.eu
jewidonevin.eu
qeqotogemet.eu
kemawonywig.eu
rynenogupez.eu
lyvevonifun.eu
tucyzogojat.eu
xuxukanoluf.eu
puzigagacal.eu
cilodamenub.eu
dikatahyqar.eu
vojeqamutuf.eu
fogynahidal.eu
nofucemihub.eu
gaduzehokar.eu
masijemaxud.eu
jepogejebak.eu
qetaseqyquv.eu
keretejuraw.eu
ryqyqequsud.eu
lymunyjigak.eu
tunicyqokuv.eu
xubolyjazaq.eu
puvojyqevus.eu
cicafykemaj.eu
dixesywyruc.eu
volyrukupoq.eu
fokuquwifys.eu
nojibukojoj.eu
gahocuwalyc.eu
magalukacom.eu
jefejurenyp.eu
qedefulywoh.eu
kepypirutyx.eu
ryturilidom.eu
lyrimirohyp.eu
tuwobiloloh.eu
xuqaxiraxyx.eu
pumelilebon.eu
cinyhotyqyt.eu
divufozutog.eu
vocupotusyz.eu
foxirozigon.eu
nozomotokyt.eu
galavozaxog.eu
makexotevyl.eu
jejykaxymob.eu
qeguhapyrer.eu
kefidaxupif.eu
rydopapifel.eu
lysowaxojib.eu
tupamapazer.eu
xutevexecif.eu
puryxepenek.eu
ciqukecywiv.eu
dimigesupew.eu
vonodecidid.eu
fobatesohek.eu
novewecoliv.eu
gacenysacew.eu
maxyvycebid.eu
jeluzydyqej.eu
qekikyvutic.eu
kejogydideq.eu
ryhadyvigis.eu
lygetudokej.eu
tufyquvaxic.eu
xudunudeveq.eu
pupucuvymup.eu
citizufurah.eu
dirojubusux.eu
vowagufifam.eu
foqesibojup.eu
nomytifazah.eu
ganuqibevux.eu
mavinifenam.eu
jecocinywut.eu
qexoligupag.eu
kezajonifuz.eu
rylefogohan.eu
lykysonalut.eu
tujurogacag.eu
xugiqonenuz.eu
pufobogyqan.eu
cidacomutur.eu
diselahidaf.eu
vopejamogul.eu
fotyfahokab.eu
norupamaxur.eu
gaqirahebof.eu
mamomamymyl.eu
jenabejurov.eu
qebexequsyw.eu
kevylejigod.eu
rycuheqojyk.eu
lyxufejazov.eu
tulipeqevyw.eu
xukorejymod.eu
pujamyqywyk.eu
cihevykupoc.eu
digyxywifyq.eu
vofukykojos.eu
fodihywalyj.eu
nopodykecoc.eu
gatopuwenyq.eu
marawukyqos.eu
jewemurutyj.eu
qeqyvulidox.eu
kemuxurohym.eu
rynikulokop.eu
lyvoguraxeh.eu
tucadilebix.eu
xuxetiryqem.eu
puzewilurip.eu
cilynitiseg.eu
dikuvizigiz.eu
vojizitoken.eu
fogokozazit.eu
nofagoteveg.eu
gadedozymiz.eu
masytoturen.eu
jepuqoxupit.eu
qetunopifef.eu
kericoxojil.eu
ryqozapaleb.eu
lymajaxecir.eu
tunegapenef.eu
xubysaxywil.eu
puvutaputeb.eu
ciciqacidir.eu
dixonesohed.eu
volocecaluk.eu
fokalesaxav.eu
nojejecebuw.eu
gahyfesyqad.eu
magusecutuk.eu
jefiredisav.eu
qedoqyvoguq.eu
kepabydokas.eu
rytecyvaxuj.eu
lyrelydevac.eu
tuwyjyvymuq.eu
xuqufyduras.eu
pumipuvupuj.eu
cinorufifac.eu
divamubojum.eu
vocebufazap.eu
foxyxubecuh.eu
nozulufynax.eu
galuhubywum.eu
makififupap.eu
jejopiniduh.eu
qegarigohox.eu
kefeminalyn.eu
rydyvigecot.eu
lysuxinebyg.eu
tupikogyqoz.eu
xutohonutyn.eu
purodogidot.eu
ciqapomogyg.eu
dimewohokol.eu
vonymomaxyb.eu
fobuvohevor.eu
novixamymyf.eu
gacokahurol.eu
maxagamisyb.eu
jeledajifor.eu
qeketaqojyf.eu
kejywajazok.eu
ryhuneqevyv.eu
lygivejynow.eu
tufozequwyd.eu
xudakejupok.eu
pupegeqifev.eu
citydekohiw.eu
dirutewaled.eu
vowuqykecij.eu
foqinywenec.eu
nomocykyqiq.eu
ganazywutes.eu
mavejykidij.eu
jecygyrogec.eu
qexusulakiq.eu
kezituraxep.eu
ryloqulebih.eu
lykonurymex.eu
tujaculurim.eu
xugelurisep.eu
pufyjulogih.eu
cidufitojex.eu
disisizazim.eu
voporitevet.eu
fotaqizymig.eu
norebituwez.eu
gaqecizupun.eu
mamylotifat.eu
jenujoxojug.eu
qebifopalaz.eu
kevopoxecun.eu
rycaropynar.eu
lyxemoxyquf.eu
tulyboputal.eu
xukuxaxidub.eu
pujulapohar.eu
cihihacakuf.eu
digofasexal.eu
vofapacebuv.eu
foderasyqaw.eu
nopymecurud.eu
gatuvesisak.eu
marixecoguv.eu
jewokedokaw.eu
qeqohevazud.eu
kemadedevak.eu
rynepevymuc.eu
lyvywyduroq.eu
tucumyvipys.eu
xuxivydifoj.eu
puzoxyvojyc.eu
cilakyfaloq.eu
dikegybecys.eu
vojedufynoj.eu
fogytubuwyx.eu
nofuwufutom.eu
gadinubidyp.eu
masovufohoh.eu
jepazunalyx.eu
qetekugexom.eu
keryginebyp.eu
ryqudigyqog.eu
lymutinutyz.eu
tuniqigison.eu
xuboninogyt.eu
puvacigakog.eu
cicezomaxyz.eu
dixyjohevon.eu
volugomymet.eu
fokisohurif.eu
nojotomipel.eu
gahoqohofib.eu
maganomojer.eu
jefecajazif.eu
qedylaqecel.eu
kepujajynib.eu
rytifaquwer.eu
lyrosajupid.eu
tuwaraqidek.eu
xuqeqejohiv.eu
pumebeqalew.eu
cinycekecid.eu
divulewybek.eu
vocijekyqiv.eu
foxofewuteq.eu
nozapekidis.eu
galerywogej.eu
makymykakic.eu
jejubyrexeq.eu
qeguxylevus.eu
kefilyrymaj.eu
rydohyluruc.eu
lysafurisam.eu
tupepulofup.eu
xutyrurojah.eu
purumulazux.eu
ciqivutevam.eu
dimoxuzynup.eu
vonokutuwah.eu
fobahizipux.eu
noveditifan.eu
gacypizohut.eu
maxuwitalag.eu
jelimixecuz.eu
qekovipynan.eu
kejaxoxuqut.eu
ryhekoputag.eu
lygegoxidul.eu
tufydopogab.eu
xudutoxakur.eu
pupiwopexof.eu
citonocebyl.eu
diravasymob.eu
vowezacuryr.eu
foqykasisof.eu
nomugacogyk.eu
ganudasajov.eu
mavitacazyw.eu
jecoqedevod.eu
qexanevymyk.eu
kezeceduwov.eu
rylyzevipyw.eu
lykujedofod.eu
tujigevojyj.eu
xugosedaloc.eu
pufotyvecyq.eu
cidaqyfynos.eu
disenybuqyj.eu
vopycyfutoc.eu
fotulybidyq.eu
norijyfohop.eu
gaqofubakeh.eu
mamasufexix.eu
jenerunybem.eu
qebequgyqip.eu
kevybunureh.eu
rycucugisix.eu
lyxilunogem.eu
tulojigakit.eu
xukafinezeg.eu
pujepigeviz.eu
cihyrimymen.eu
digumihurit.eu
vofubimipeg.eu
fodixohofiz.eu
nopolomojen.eu
gatahohalir.eu
marefomecef.eu
jewypojynil.eu
qequroquweb.eu
kemimojitir.eu
rynovaqidef.eu
lyvoxajohul.eu
tucakaqalav.eu
xuxehajexuw.eu
puzydaqybad.eu
cilupakuquk.eu
dikiwewutav.eu
vojomekisuw.eu
fogavewogad.eu
nofexekakuk.eu
gadekewexac.eu
masygekevuq.eu
jepuderymas.eu
qetityluruj.eu
kerowyripac.eu
ryqanylofuq.eu
lymevyrajas.eu
tunyzylazuj.eu
xubukyrecax.eu
puvugulynum.eu
cicidutuwap.eu
dixotuzipuh.eu
volaqutodox.eu
fokenuzohym.eu
nojycutalop.eu
gahuzuzecyg.eu
magijityboz.eu
jefogixuqyn.eu
qedosiputot.eu
kepatixidyg.eu
ryteqipogoz.eu
lyrynixakyn.eu
tuwucopexot.eu
xuqiloxyvyf.eu
pumojopymol.eu
cinafocuryb.eu
divesosisor.eu
vocerocofyf.eu
foxyqosajol.eu
nozubacezyb.eu
galicasevor.eu
makolacynyd.eu
jejajaduwok.eu
qegefavipev.eu
kefypadofiw.eu
rydurevohed.eu
lysumedalik.eu
tupibevecev.eu
xutoxedyniq.eu
puralevuqes.eu
ciqehefitij.eu
dimyfebidec.eu
vonupyfogiq.eu
fobirybakes.eu
novomyfexij.eu
gacovybybec.eu
maxaxyfumim.eu
jelekynurep.eu
qekyhugisih.eu
kejudunogex.eu
ryhipugajim.eu
lygowunezep.eu
tufamugevih.eu
xudevunymex.eu
pupexuguwun.eu
citykimipat.eu
dirugihofug.eu
vowidimajaz.eu
foqotihalun.eu
nomawimecat.eu
ganenihynug.eu
mavyvomuqal.eu
jecuzojitub.eu
qexukoqodar.eu
kezigojohuf.eu
rylodoqakal.eu
lykatojexub.eu
tujeqoqybar.eu
xugynajuquf.eu
pufucaqurak.eu
cidizakisuv.eu
disojawogaw.eu
vopogakakud.eu
fotasawezak.eu
noretekyvuv.eu
gaqyqewymow.eu
mamunekuryd.eu
jeniceripoj.eu
qebolelofyc.eu
kevajerajoq.eu
rycefelelys.eu
lyxesyrecoj.eu
tulyrylynyc.eu
xukuqyruwoq.eu
pujibylityp.eu
cihocytodoh.eu
digalyzohyx.eu
vofejutalom.eu
fodyfuzexyp.eu
nopuputyboh.eu
gaturuzuqyx.eu
marimutitom.eu
jewobuxisyt.eu
qeqaxupogog.eu
kemelixakyz.eu
rynyhipexon.eu
lyvufixyvet.eu
tucipipumig.eu
xuxorixurez.eu
puzomipipin.eu
cilavocofer.eu
dikexosajif.eu
vojykocezel.eu
foguhosecib.eu
nofidocyner.eu
gadoposuwif.eu
masawocipel.eu
jepemadodiv.eu
qetevavahew.eu
keryxadalid.eu
ryqukavecek.eu
lymigadybiv.eu
tunodavuqew.eu
xubateditid.eu
puvewevodek.eu
cicynefogic.eu
dixuvebakeq.eu
voluzefexus.eu
fokikebyvaj.eu
nojogefumuc.eu
gahadyburaq.eu
magetyfisus.eu
jefyqynofaj.eu
qedunygajux.eu
kepicynezam.eu
rytozygyvup.eu
lyrojunynah.eu
tuwaguguwux.eu
xuqesunipam.eu
pumytugofup.eu
cinuqumahag.eu
divinuheluz.eu
vococumecan.eu
foxalihynut.eu
nozejimuqag.eu
galefihituz.eu
makysimodan.eu
jejurijogut.eu
qegiqiqakof.eu
kefobojexyl.eu
rydacoqybob.eu
lyselojumyr.eu
tupyjoqirof.eu
xutufojisyl.eu
purupoqogob.eu
ciqirokajyr.eu
dimomawezod.eu
vonabakyvyk.eu
fobexawumov.eu
novylakuwyw.eu
gacuhawipod.eu
maxifakofyk.eu
jeloperajov.eu
qekorelelyq.eu
kejamerecos.eu
ryhevelynyj.eu
lygyxeruqoc.eu
tufukelityq.eu
xudiherodos.eu
pupodylahej.eu
citapytakic.eu
direwyzexem.eu
vowemytybip.eu
foqyvyzuqeh.eu
nomuxytirix.eu
ganikuzosem.eu
mavogutogip.eu
jecaduxakeh.eu
qexetupezix.eu
kezywuxyven.eu
rylunupumit.eu
lykuvuxureg.eu
tujizipipiz.eu
xugokixofen.eu
pufagipajit.eu
cidediceleg.eu
disytisycil.eu
vopuqicyneb.eu
fotinosuwir.eu
norococitef.eu
gaqozosodul.eu
mamajocahab.eu
jenegodelur.eu
qebysovexaf.eu
kevutodybuk.eu
ryciqavuqav.eu
lyxonadituw.eu
tulacavosad.eu
xukeladoguk.eu
pujejavakav.eu
cihyfafexuw.eu
digusebyvad.eu
vofirefumuj.eu
fodoqebirac.eu
nopabefipuq.eu
gatecebofas.eu
marylefajuj.eu
jewujenezac.eu
qequfygycuq.eu
kemipynunap.eu
rynoryguwuh.eu
lyvamynipox.eu
tucebygodym.eu
xuxyxynahop.eu
puzulugelyh.eu
cilihumecox.eu
dikofuhybym.eu
vojopumuqot.eu
fogaruhityg.eu
nofemumodoz.eu
gadyvuhagyn.eu
masuximakot.eu
jepikijexyg.eu
qetohiqyvoz.eu
keradijumyn.eu
ryqepiqiror.eu
lymewijosyf.eu
tunymoqofol.eu
xubuvojajyb.eu
puvixoqezor.eu
cicokokyvyf.eu
dixagowunol.eu
voledokuwev.eu
fokytowipiw.eu
nojuwakofed.eu
gahunawahik.eu
magivakelev.eu
jefozaryciw.eu
qedakalyned.eu
kepegaruqik.eu
rytydelitec.eu
lyruterodiq.eu
tuwiqelages.eu
xuqonerekij.eu
pumocelexec.eu
cinazetybiq.eu
divejezumes.eu
vocygytirij.eu
foxusyzosex.eu
nozitytogim.eu
galoqyzajep.eu
makanytezih.eu
jejecyxyvex.eu
qegelupumum.eu
kefyjuxiwap.eu
rydufupipug.eu
lysisuxofaz.eu
tuporupajun.eu
xutaquxelat.eu
purebupycug.eu
ciqycicunaz.eu
dimulisuqun.eu
vonujicitat.eu
fobifisoduf.eu
novopicahal.eu
gacarisekub.eu
maxemocexar.eu
jelybodybuf.eu
qekuxovuqal.eu
kejilodirub.eu
ryhohovosar.eu
lygofodagud.eu
tufapovakak.eu
xuderadezuv.eu
pupymavyvow.eu
cituvafumyd.eu
dirixabirok.eu
vowokafopyv.eu
foqahabofoq.eu
nomedefajys.eu
ganepebeloj.eu
mavywefycyc.eu
jecumenunoq.eu
qexiveguwys.eu
kezoxenitoj.eu
rylakegodyc.eu
lykegynahom.eu
tujydygelyp.eu
xugutynyxoh.eu
pufuwygybyx.eu
cidinymuqom.eu
disovyhityp.eu
vopazumosoh.eu
fotekuhagyx.eu
norygumekon.eu
gaquduhexet.eu
mamitumyvig.eu
jenoqujumez.eu
qebonuqirin.eu
kevacijopet.eu
ryceziqofig.eu
lyxyjijajel.eu
tulugiqezib.eu
xukisijycer.eu
pujotiqunif.eu
cihaqokiwel.eu
digenowipib.eu
vofecokoder.eu
fodylowahif.eu
nopujokelek.eu
gatifowyciv.eu
marosokubew.eu
jewararuqid.eu
qeqeqalitek.eu
kemybarodiv.eu
rynucalagew.eu
lyvularekud.eu
tucijalexaj.eu
xuxoferyvuc.eu
puzapelumaq.eu
cileretirus.eu
dikymezosaj.eu
vojubetafuc.eu
fogixezajaq.eu
nofoletezup.eu
gadohyzyvah.eu
masafytunux.eu
jepepyxiwam.eu
qetyrypopup.eu
kerumyxofah.eu
ryqivypahux.eu
lymoxuxelam.eu
tunakupycut.eu
xubehuxunag.eu
puvedupuquz.eu
cicypucitan.eu
dixuwusodut.eu
volimucagog.eu
fokovisekyz.eu
nojaxicyxon.eu
gahekisybyr.eu
magygicumof.eu
jefudidiryl.eu
qedutivosob.eu
kepiwodagyr.eu
rytonovejof.eu
lyravodezyl.eu
tuwezovyvov.eu
xuqykodumyw.eu
pumugoviwod.eu
cinidofopyk.eu
divotabofov.eu
vocoqafajyw.eu
foxanabelod.eu
nozecafycyk.eu
galyzabunoc.eu
makujafiqyq.eu
jejigenitos.eu
qegosegodej.eu
kefatenahic.eu
rydeqegekeq.eu
lysenenyxis.eu
tupycegubej.eu
xutulenuqix.eu
purijygirem.eu
ciqofymosip.eu
dimasyhageh.eu
vonerymekix.eu
fobyqyhezem.eu
novubymyvip.eu
gacucuhumeg.eu
maxilumiriz.eu
jelojujopen.eu
qekafuqafit.eu
kejepujajeg.eu
ryhyruqeliz.eu
lygumujycen.eu
tufibiqunit.eu
xudoxijiwef.eu
pupoliqotul.eu
citahikodab.eu
direfiwahur.eu
vowypikelaf.eu
foqurowyxul.eu
nomimokubab.eu
ganovowuqur.eu
mavaxokitad.eu
jecekorosuk.eu
qexeholagav.eu
kezydorekuw.eu
rylupalyxad.eu
lykiwaryvuk.eu
tujomalumav.eu
xugavariruq.eu
pufexalopas.eu
cidykatafuj.eu
disugezejac.eu
vopudetezuq.eu
fotitezycas.eu
norowetunuj.eu
gaqaneziwoc.eu
mamevetopym.eu
jenyzexodop.eu
qebukypahyh.eu
kevigyxelox.eu
rycodypycym.eu
lyxotyxubop.eu
tulaqypiqyh.eu
xukenyxitox.eu
pujycupodyn.eu
cihuzucagot.eu
digijusekyg.eu
vofogucyxoz.eu
fodasusuvyn.eu
nopetucumot.eu
gatequsiryg.eu
marynicosol.eu
jewucidafyb.eu
qeqilivejor.eu
kemojidezyf.eu
rynafivyvol.eu
lyvesiduneb.eu
tucyroviwir.eu
xuxuqodopef.eu
puzubovafik.eu
cilicofahev.eu
dikolobeliw.eu
vojajofyced.eu
fogefobunik.eu
nofypafiqev.eu
gadurabotiw.eu
masimafoded.eu
jepobanagij.eu
qetoxagekec.eu
keralanyxiq.eu
ryqehegubes.eu
lymyfenumij.eu
tunupegirec.eu
xubirenosiq.eu
puvomegagep.eu
cicavemejih.eu
dixexehyzex.eu
volekymyvum.eu
fokyhyhumap.eu
nojudymiwuh.eu
gahipyhopax.eu
magowymafum.eu
jefamyjejat.eu
qedevuqelug.eu
kepyxujycaz.eu
rytukuqunun.eu
lyrugujiqat.eu
tuwiduqotug.eu
xuqotujodaz.eu
pumawuqahun.eu
cinenikekar.eu
divyviwyxuf.eu
vocuzikubal.eu
foxikiwiqub.eu
nozogikirar.eu
galodiwosuf.eu
makatokagal.eu
jejeqorekuv.eu
qegynolyzow.eu
kefucoruvyd.eu
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\9B85F9~1.EXE," 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe -
Simda family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 353 1668 Process not Found -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 2 IoCs
pid Process 3600 setup.exe 2984 setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9B85F9~1.EXE" 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9B85F9~1.EXE" 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\849e876f = "\x12Ü,Të!TçÜr¨ÿ\u0090¬Po8\x13\x1a\x01U\fOŒ_ÿy½÷œÖoõ\u0090yâh5¬½\u00ad\u00add:ÍwÙ\u00a0˜—ϳ§\x17¼[he_\u00ad¢Ú}‰‹Ï˜ˆ{/H+{¢ÎûéªÌDøPm\vgÙkó«ž´8ïèïm\x1d\x03H!ØH•l\x19\u009d,ù5Õq3–@½î«4+\bx(\x13´rm\\()QÉŠ¬T¸ÐQ^Àú\x02csMbâÙ Aã\x0eK\u0090©ðÄæÖXÒáÌØ‚P\u00a0p2˜‚6(Ã\x05\f&\x1bÙPPB\x1c¶†°T¨9êÒø˜\x03C\x11”N\b\x15bud" 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe -
resource yara_rule behavioral2/memory/1456-0-0x0000000000400000-0x000000000062D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\bs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ga.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_stub.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\edge_feedback\camera_mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\te.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\el.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\concrt140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Mu\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\ms.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\ko.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\tr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_feedback\mf_trace.wprp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\sr-Latn-RS.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\gu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\gd.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Installer\msedge_7z.data setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\beta.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\ga.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\am.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\mip_core.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\ja.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\af.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\VisualElements\SmallLogo.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\VisualElements\SmallLogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\internal.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\et.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Locales\nn.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\msvcp140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\wns_push_client.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.VisualElementsManifest.xml setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\delegatedWebFeatures.sccd setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Sigma\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\af.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\msedge.exe.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\msvcp140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\de.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Locales\lo.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\icudtl.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\msvcp140_codecvt_ids.dll setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2564 MicrosoftEdgeUpdate.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\notification_helper.exe\"" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\ setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\LocalService = "MicrosoftEdgeElevationService" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\AppId = "{628ACE20-B77A-456F-A88D-547DB6CEEDD5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\ = "{C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ie_to_edge_bho.dll\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}\ = "ie_to_edge_bho" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ie_to_edge_bho.dll\AppID = "{31575964-95F7-414B-85E4-0E9A93699E13}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\BHO\\ie_to_edge_bho.dll" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LoadUserSettings = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib\ = "{C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.69\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767}\AppID = "{1FCBE96C-1697-43AF-9140-2897C7C69767}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0 setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe Token: SeSecurityPrivilege 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe Token: SeSecurityPrivilege 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe Token: SeSecurityPrivilege 1456 9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe Token: 33 3600 setup.exe Token: SeIncBasePriorityPrivilege 3600 setup.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3600 2480 MicrosoftEdge_X64_133.0.3065.69.exe 109 PID 2480 wrote to memory of 3600 2480 MicrosoftEdge_X64_133.0.3065.69.exe 109 PID 3600 wrote to memory of 2984 3600 setup.exe 110 PID 3600 wrote to memory of 2984 3600 setup.exe 110 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe"C:\Users\Admin\AppData\Local\Temp\9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTA5ODc4ODA3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2564
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\MicrosoftEdge_X64_133.0.3065.69.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3600 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6732f6a68,0x7ff6732f6a74,0x7ff6732f6a803⤵
- Executes dropped EXE
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe
Filesize6.8MB
MD5bdb1aecedc15fc82a63083452dad45c2
SHA1a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb
SHA2564ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f
SHA51250909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d