Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5JaffaCakes...31.exe
windows7-x64
3JaffaCakes...31.exe
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
7$PLUGINSDI...ar.exe
windows10-2004-x64
3$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...rc.dll
windows7-x64
3$PROGRAM_F...rc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.exe
windows7-x64
7$PLUGINSDI...pt.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...st.exe
windows7-x64
7$PLUGINSDI...st.exe
windows10-2004-x64
3$PLUGINSDIR/v9fft.exe
windows7-x64
10$PLUGINSDIR/v9fft.exe
windows10-2004-x64
10$TEMP/AskPIP_FF_.exe
windows7-x64
3$TEMP/AskPIP_FF_.exe
windows10-2004-x64
3$TEMP/AskT...IC.dll
windows7-x64
8$TEMP/AskT...IC.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2025, 20:16
Behavioral task
behavioral1
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/v9fft.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/v9fft.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
$TEMP/AskPIP_FF_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMP/AskPIP_FF_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win10v2004-20250217-en
General
-
Target
$PLUGINSDIR/hao123inst-taiwan.exe
-
Size
305KB
-
MD5
efd47a079976283cde2a1f9547689cde
-
SHA1
9f90940372c37d7d4125774190efcd5c8263a2c6
-
SHA256
4c52fc7d54f3b4cb1b4e7bcc66a778e9c704211f8406f382cfbb541db42398a1
-
SHA512
47fac55eb2bd937692048ceebaf5da8d1b72e9d7e6954c51082d2b753039a2c00a82c5db04d7216c412b4376e6da7126662e3f7e6734008333d6840b28301a53
-
SSDEEP
6144:gjbTUh/hQXxBvQ0utY3jNp1NZEE/1rEpYANhWx:gzGQXDo0utIjNHNqGrEKChc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation hao123inst-taiwan.exe -
Executes dropped EXE 2 IoCs
pid Process 808 hao123.1.0.0.1100.exe 2192 hao123.1.0.0.1100.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral24/memory/3576-0-0x0000000000400000-0x0000000000534000-memory.dmp upx behavioral24/memory/3576-40-0x0000000000400000-0x0000000000534000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123inst-taiwan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1100.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Microsoft\Internet Explorer\Main hao123inst-taiwan.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://tw.hao123.com/?tn=forf_hp_hao123_tw" hao123inst-taiwan.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ hao123inst-taiwan.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 3576 hao123inst-taiwan.exe 3576 hao123inst-taiwan.exe 3576 hao123inst-taiwan.exe 3576 hao123inst-taiwan.exe 2192 hao123.1.0.0.1100.exe 2192 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 1564 msedge.exe 1564 msedge.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 3932 msedge.exe 3932 msedge.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 808 hao123.1.0.0.1100.exe 4896 identity_helper.exe 4896 identity_helper.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 808 3576 hao123inst-taiwan.exe 87 PID 3576 wrote to memory of 808 3576 hao123inst-taiwan.exe 87 PID 3576 wrote to memory of 808 3576 hao123inst-taiwan.exe 87 PID 3576 wrote to memory of 2192 3576 hao123inst-taiwan.exe 88 PID 3576 wrote to memory of 2192 3576 hao123inst-taiwan.exe 88 PID 3576 wrote to memory of 2192 3576 hao123inst-taiwan.exe 88 PID 808 wrote to memory of 3932 808 hao123.1.0.0.1100.exe 90 PID 808 wrote to memory of 3932 808 hao123.1.0.0.1100.exe 90 PID 3932 wrote to memory of 4900 3932 msedge.exe 92 PID 3932 wrote to memory of 4900 3932 msedge.exe 92 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 4416 3932 msedge.exe 94 PID 3932 wrote to memory of 1564 3932 msedge.exe 95 PID 3932 wrote to memory of 1564 3932 msedge.exe 95 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96 PID 3932 wrote to memory of 1588 3932 msedge.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-taiwan.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-taiwan.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Roaming\baidu\hao123-tw\hao123.1.0.0.1100.exe"C:\Users\Admin\AppData\Roaming\baidu\hao123-tw\hao123.1.0.0.1100.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://tw.hao123.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa15c646f8,0x7ffa15c64708,0x7ffa15c647185⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:25⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:85⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:15⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:15⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:15⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:85⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:15⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:15⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:15⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:15⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:15⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11662626966532270876,7310213954192260198,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
-
-
C:\Users\Admin\AppData\Roaming\baidu\hao123-tw\hao123.1.0.0.1100.exefirst_exec_from_inst3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a4852fc46a00b2fbd09817fcd179715d
SHA1b5233a493ea793f7e810e578fe415a96e8298a3c
SHA2566cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f
SHA51238972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc
-
Filesize
152B
MD50d6b4373e059c5b1fc25b68e6d990827
SHA1b924e33d05263bffdff75d218043eed370108161
SHA256fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2
SHA5129bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD541bc2e880cc1155ab991ae1c6ac82d45
SHA1a970300ea863b853361042f0e9a950df0090bd6e
SHA2566eb2bcc40052ae311db6992ea79ccc00115d4611b94d259dc70f8c1f305b0aea
SHA512f9bcc525b3ecf581a414dfb57f231c13562bf40649ae5f2adc78a90067a4da211aaae2b8c1f3b81bad85ccd70bb33ab3b93f58d41f5a512a65a33922ff2e24e3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5e164b79ac56669beb2a58fd0fe9a829b
SHA163a3376cae3936eab8b346cb60fef565383552f3
SHA2562ed6833c5313d7fca9bd5a1175016c0efc397b514157102cd222753798da69da
SHA5125442608cd3e784d35cb1024fcd180505e31db80e6c7274fc2b0147c14fd3e147e5ea752373c9ed2caad4a7bec7567ff2cb5602d6a124309e292ea6a0963b5a0d
-
Filesize
7KB
MD549596a9cb5c210857ed54469418d1ef6
SHA1f7d025542a3270261319d385f1c9e4b1ba2b4dd9
SHA25679aeceae14d89a78d74064de8110e7f5f61d4dcfdcadfd9706e6274d71c237b2
SHA5126faa6d8b444dee4d7681b23107d735b015aee00ed207d94778fa515f77dd308c6a3f59f2cf9e3651385a2943e2c8eb389799b58dfe581310492a38b95c8ceafb
-
Filesize
7KB
MD5eb5e175e407733f1eb3277754de81172
SHA1280333a72cd154e4180ce0d84316c48d23b0cacf
SHA25617e5c2e2dc2d5e1c0d10301a28b48e205a623fe04d5d8ffa5593ebf03f62cc97
SHA51207cd6cf20eb7d2d8478feff194729cb647247f81a71c807b882d53e117ec3797cd05d51e5cf3fd0d9683139f96cad4310d725abde8265f89ff37eca9ce3b0ce8
-
Filesize
1KB
MD5963ce9c9af5155ad019c7d4d5c0a16a4
SHA173729efa4ae8b3af33190c2d41ad13585ed26d09
SHA256b4a0751a10b04803063f0f143f539287a25712a53aa4377edef8e85ec37c50f5
SHA512dc3fbf52bce0897d17ed56348bc94d4be35cb380de52787797ca1124a12f5eed9c070cb10d592a267725a1d6b6619e2b064e6b12c639aebf136f665d00581fc4
-
Filesize
706B
MD538f9c0a5725624323222166cd3a71c99
SHA1437254b028357a3bfc61c2fc8da244159a0da7bd
SHA256695a7762c96bae0bbf785a89b730c6cffb1c793728c712896ba7358a85b17da1
SHA5125d53fc7511ca9c9730e7e761c137cc47a1fc0e74be35244d14c0dc93689ef93440ac947b30b47ed917cad6d51edf39d8e9f3986144e1e52588666349d030e134
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c998d2de-8233-4cf8-bede-2ebf80c5a16f.tmp
Filesize6KB
MD50a3bfc7e58d85a4afaf514425b5255a6
SHA114f3b90165bf937b8d6244ea765fb93055b9fbdd
SHA2560cf82b55b00214df141e36f2982e0e35faee491223ebd0a1250ed6a29fba798f
SHA5127e95c9b0d01fc671d5e27479fd1d63bafc5484d39dfe26ad9c9039d1d1ec8e40cba01e085a7f8053f8ec9d3641fa9e6d3a813d7f39508c7b3c83325f05dd5b49
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e3dc967ee60cdf1739ce3a138e78a72
SHA18b25f3af1f7bcb3529f399f77e4c3d1c0ade2a6d
SHA256ce388216216f4b0cff240fb3ee5d8539b6b098cee37aa674b6cc7bfeb0966f82
SHA5122f515fc6059a94a9676a7075394553bdb032546c9a636ff6b97c924a28873efa02df7786ab600d112baa051052a6d959e3170cc4c0367abbd755fea5cc68d9e1
-
Filesize
1KB
MD54c0f77f4b7899ce2af9124d7b7ae23b4
SHA1bad149489ac94e86ed33f413c1de60e5bda38e7a
SHA256d83a54a76250d50a4644a9ee4e24a985ea357ba561a38bc3792b0dae5da5869e
SHA512350c0fb1426a2bd81732c4f5a686d050af58ec47923cafbf4943cea3e8700cb8ffb7a0e3ea62f05b8be4ae851fe7271cbd5feb14decb35c67d7307aa67638805
-
Filesize
536KB
MD52d70d95d5aa1027ad772a35d2a95fe2c
SHA1f2c05d81c507d29473bcd84a1b0ddaf12022d1db
SHA2567fa96f4fdff5abb39587b3be3e969c1c0188a75cd9871ef25351c2becd1c1724
SHA512e48e73984644f1a8095fc90fc1fc719fc9b07ccfa0ff1ae9a92f7a73cbe4f99b9c72912f7f1b0c4bd44b9ecc0f3d868d3cccfe6f9a74483feed2f582aacf6991
-
Filesize
1KB
MD5e32960ba0740d5f3c7bff400a6f60619
SHA19894bb7bad12819dd86567dd22462e463037deb5
SHA256410d52d968367ff46ebf30b38efed7d4c49630276a4026ce4e57932badf4c80e
SHA512c2c7cf012a693ddd86147bdc07ee9257c736d0e5e9a9032b787243d6d66ae64b305b6697772bdb2ff9b8d37661d687de5180db8acb34f4f62bf006d57ea8cb2f