Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5JaffaCakes...31.exe
windows7-x64
3JaffaCakes...31.exe
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
7$PLUGINSDI...ar.exe
windows10-2004-x64
3$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...rc.dll
windows7-x64
3$PROGRAM_F...rc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.exe
windows7-x64
7$PLUGINSDI...pt.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...st.exe
windows7-x64
7$PLUGINSDI...st.exe
windows10-2004-x64
3$PLUGINSDIR/v9fft.exe
windows7-x64
10$PLUGINSDIR/v9fft.exe
windows10-2004-x64
10$TEMP/AskPIP_FF_.exe
windows7-x64
3$TEMP/AskPIP_FF_.exe
windows10-2004-x64
3$TEMP/AskT...IC.dll
windows7-x64
8$TEMP/AskT...IC.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2025, 20:16
Behavioral task
behavioral1
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/v9fft.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/v9fft.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
$TEMP/AskPIP_FF_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMP/AskPIP_FF_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win10v2004-20250217-en
General
-
Target
$PLUGINSDIR/hao123inst-japan.exe
-
Size
776KB
-
MD5
35216cfcfcdfd7c2df84804ed69fdcfd
-
SHA1
34d77a23aa7c7648948e4bfab31f33f517a785dc
-
SHA256
a2157e3cf367d84dac8847bf2f20d32e1a420ddf297d879fa06113e08f9fc6dd
-
SHA512
385d4b10c29c35b0b933f3dcf02e269e784f01e4836e6e1c9d60536cc7c30afb15bf5a70cfeaa4f2d1ec02e12c174d21c4924a02fabf3774f6f9834ca913a2c8
-
SSDEEP
24576:f1Du4E0/zuFrHQR0pFGFbPEZB4gbZTkz74gbZg:dDFzuEDEZB4gbZY34gbZg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation hao123inst-japan.exe -
Executes dropped EXE 2 IoCs
pid Process 1328 hao123.1.0.0.1100.exe 3676 hao123.1.0.0.1100.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123inst-japan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1100.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Internet Explorer\Main hao123inst-japan.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://jp.hao123.com/?tn=forf_hp_hao123_jp" hao123inst-japan.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ hao123inst-japan.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 4032 hao123inst-japan.exe 4032 hao123inst-japan.exe 4032 hao123inst-japan.exe 4032 hao123inst-japan.exe 3676 hao123.1.0.0.1100.exe 3676 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 4460 msedge.exe 4460 msedge.exe 4672 msedge.exe 4672 msedge.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 1328 hao123.1.0.0.1100.exe 900 identity_helper.exe 900 identity_helper.exe 1132 msedge.exe 1132 msedge.exe 1132 msedge.exe 1132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 1328 4032 hao123inst-japan.exe 87 PID 4032 wrote to memory of 1328 4032 hao123inst-japan.exe 87 PID 4032 wrote to memory of 1328 4032 hao123inst-japan.exe 87 PID 4032 wrote to memory of 3676 4032 hao123inst-japan.exe 88 PID 4032 wrote to memory of 3676 4032 hao123inst-japan.exe 88 PID 4032 wrote to memory of 3676 4032 hao123inst-japan.exe 88 PID 1328 wrote to memory of 4672 1328 hao123.1.0.0.1100.exe 90 PID 1328 wrote to memory of 4672 1328 hao123.1.0.0.1100.exe 90 PID 4672 wrote to memory of 4992 4672 msedge.exe 92 PID 4672 wrote to memory of 4992 4672 msedge.exe 92 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 1188 4672 msedge.exe 93 PID 4672 wrote to memory of 4460 4672 msedge.exe 94 PID 4672 wrote to memory of 4460 4672 msedge.exe 94 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95 PID 4672 wrote to memory of 4344 4672 msedge.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-japan.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-japan.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\baidu\hao123-jp\hao123.1.0.0.1100.exe"C:\Users\Admin\AppData\Roaming\baidu\hao123-jp\hao123.1.0.0.1100.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://jp.hao123.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb52de46f8,0x7ffb52de4708,0x7ffb52de47185⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:25⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:85⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:15⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:15⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:85⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:15⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2128 /prefetch:15⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:15⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:15⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,1175347773815068619,17905422756274735368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3540 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
-
-
C:\Users\Admin\AppData\Roaming\baidu\hao123-jp\hao123.1.0.0.1100.exefirst_exec_from_inst3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD593be3a1bf9c257eaf83babf49b0b5e01
SHA1d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a
SHA2568786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348
SHA512885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52
-
Filesize
152B
MD56738f4e2490ee5070d850bf03bf3efa5
SHA1fbc49d2dd145369e8861532e6ebf0bd56a0fe67c
SHA256ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab
SHA5122939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b
-
Filesize
6KB
MD5afeb9decc6160cd8341b20c1d2dc827d
SHA1c3f651a0ca51e7051d164e5a81e8df8663fec3b7
SHA256d16affd9c282c26c04fe7ad197744ba64a55d708fbc5095e85b48446510bb975
SHA512af04bac59b5c7ba355270e6ae3268fcf51a5bc22570364e2835e9d66bc001d7172f1bbdb883db1ffe10f14ddecebde61a3a31067af1e92f944bb3fded1627353
-
Filesize
6KB
MD52264a8bc5bc960393a603b9b1de2fb2f
SHA1d9173d0c20b30b2242c16f1389856b31ea4fb242
SHA256bda2c4383008285393249a053e2c55f4e6e7f5c16aeb98796181f3f9e2875f91
SHA512bcc24c997967cea001601c4f09a4bed25cbcabbf9673a1252e48a5b7655ebd05471a0ae1008a0113cccab2c9abd2f0d46290fc55c4be5799d84f7854149aefef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5621df0f2bebd8aabd663788fa4f19b51
SHA147d05e26819847310a3db3d79a6148e92eeecc78
SHA256e5e817f5f5d26afbc4d8e9bb56e09fe20123a273cd97986c05a8419866671100
SHA512b67a1393081b1bd19919bb90d601373aa467b26fc324a0ccb98ddd8f5347a2ed271921797ad2ca1f503edc65f5a67e44be0854d85cbd64420e856de965e9f207
-
Filesize
1KB
MD5891539b7c968a580a2c49eb4b1998102
SHA1465523329a915b2ab2d036aa2298525170df951f
SHA256ce4138a0ce77c22dcb337edd4fbc315e377fcd9962961b5b79506e0bb87d89a3
SHA512581c62519b52ce4b31dcf0a235530b8d722d3f049c9dd8756b20f7066ef2220f6100f22ef5d64294a90559474bf6d49cdb65d471bae8f868af063c67e097bbed
-
Filesize
532KB
MD524084b3b7c98ee06e90b381511e93749
SHA1f8633cd3058205acfcc4473944b660f76874a11c
SHA2568ae85201b89c0f65c17dab19e78a4610ade2947899d46fded6513fa3a2b45b11
SHA512078f3be10735cd8818ec4babe4050224aae99d5f19cd8329cb29a40fcae86c4184502e559c763490fc93931b101efb40a053b4e9efba66138208520dd75eb709
-
Filesize
1KB
MD5a094fc2849f9326286a7e244b7e9f5e4
SHA13023a18de2854541a473cd8d1e33cd933fb12286
SHA256e318575b5a0274286c32308d86745cd24b81b8e50004e82e7fec4d2c864f504c
SHA51221c17226dd117e2fd8d39f5b889ea33ffed804682761a855e1f46a1560e28567ae44fa40eb1cc69e3d4144c754866ca1cc46fe042e310f08fcc29192bf0adfa1