Analysis
-
max time kernel
78s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 14:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zippyshare.day/KhiRqOimV0yTvua/file
Resource
win10v2004-20250217-en
General
-
Target
https://zippyshare.day/KhiRqOimV0yTvua/file
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5552
c3deeffb05c4fa7f233694e4990d7e74
-
reg_key
c3deeffb05c4fa7f233694e4990d7e74
-
splitter
|'|'|
Signatures
-
Njrat family
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 1548 netsh.exe 1100 netsh.exe 5200 netsh.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe HWID Spoofer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe HWID Spoofer.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\microsoft corporation.exe taskmgr.exe -
Executes dropped EXE 1 IoCs
pid Process 5704 StUpdate.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWID Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings taskmgr.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 2024 NOTEPAD.EXE 2896 NOTEPAD.EXE 2584 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 1516 msedge.exe 1516 msedge.exe 4536 identity_helper.exe 4536 identity_helper.exe 720 msedge.exe 720 msedge.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe 5224 HWID Spoofer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5224 HWID Spoofer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 5224 HWID Spoofer.exe Token: 33 5224 HWID Spoofer.exe Token: SeIncBasePriorityPrivilege 5224 HWID Spoofer.exe Token: SeDebugPrivilege 4860 taskmgr.exe Token: SeSystemProfilePrivilege 4860 taskmgr.exe Token: SeCreateGlobalPrivilege 4860 taskmgr.exe Token: 33 5224 HWID Spoofer.exe Token: SeIncBasePriorityPrivilege 5224 HWID Spoofer.exe Token: 33 5224 HWID Spoofer.exe Token: SeIncBasePriorityPrivilege 5224 HWID Spoofer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 1516 msedge.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe 4860 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 5656 1516 msedge.exe 85 PID 1516 wrote to memory of 5656 1516 msedge.exe 85 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 1976 1516 msedge.exe 86 PID 1516 wrote to memory of 2312 1516 msedge.exe 87 PID 1516 wrote to memory of 2312 1516 msedge.exe 87 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88 PID 1516 wrote to memory of 2688 1516 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://zippyshare.day/KhiRqOimV0yTvua/file1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe66d346f8,0x7ffe66d34708,0x7ffe66d347182⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3968 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2192,574112850025508366,6906984440318144031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5364
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4468
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\spoofer\steps.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2024
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\spoofer\Tutorial.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2896
-
C:\Users\Admin\Downloads\spoofer\HWID Spoofer.exe"C:\Users\Admin\Downloads\spoofer\HWID Spoofer.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5224 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Downloads\spoofer\HWID Spoofer.exe" "HWID Spoofer.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\Downloads\spoofer\HWID Spoofer.exe"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Downloads\spoofer\HWID Spoofer.exe" "HWID Spoofer.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn StUpdate /tr C:\Users\Admin\AppData\Local\Temp/StUpdate.exe2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3796
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\spoofer\Tutorial.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2584
-
C:\Users\Admin\AppData\Local\Temp\StUpdate.exeC:\Users\Admin\AppData\Local\Temp/StUpdate.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5704
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4860
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50d6b4373e059c5b1fc25b68e6d990827
SHA1b924e33d05263bffdff75d218043eed370108161
SHA256fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2
SHA5129bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4
-
Filesize
152B
MD5a4852fc46a00b2fbd09817fcd179715d
SHA1b5233a493ea793f7e810e578fe415a96e8298a3c
SHA2566cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f
SHA51238972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc
-
Filesize
214KB
MD5d20fef07db1e8a9290802e00d1d65064
SHA171befda9256ed5b8cd8889f0eeab41c50d66e64e
SHA256f9cb4624d03224bfce50c4c0e484418acd462c249f38b4684e72b27a1f30144d
SHA512ad5b2c8df60027c6dd5104bb8c2357b04eb24d69245c607ff99a6f2a887f929428252ad793d9aaa8c903c7b1e1bf9653cd35f79747d5281e7e3d2c21fa828537
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD5c1d70d5881f5caa5d1d8bc88128ceced
SHA1e40d1586fbf49fc1887b64570505b6a4d4cf6749
SHA25635fd28c382d4f5c0f0a0695c22110760c21019ed6e59b07c575fffda93744e4f
SHA5126e9de9ebac449fe9cad7939c9df647e10f0923392702adef1cb10866a03c6036ad2312b1e395da9d158b141e5bb8c02ac14ecf109224c11504bf8beef40558ba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD5efc02c59ba7ffa4d8a9adee51c5daa98
SHA18d0ec1d13ebc34b31a10264aa26b3195e961c82f
SHA25628de6c15c19f9f91e2608b388812ffc76c1959159eb94678c8683a66144fcfbc
SHA5124435ed17f39b7c9f189ffe4c49519ad4f8b6fa3363de7dc1428d26915d3daf659fcfb420861889460e08be17bc551ae04793e0bd0c938590acabbde978cff7fc
-
Filesize
5KB
MD52ce307c18be8b5826fbb90c7b0133add
SHA1d3477028c718fa7354889f0a1d5d54b8fa2cda07
SHA256419b2aa2fa206146ca5f6631da0fe4518bcaae4f256d8d827a2bf1d67a08ec6a
SHA5120ef247914e3741f1c4e98fc170c8787f02dd87ee64e89f209c8a24d1c2972e165d1e896743aee63249f45edd936da76b72a331a487efde22f77a7a1d728c086b
-
Filesize
7KB
MD5d6c89ae016832b5ad90a573b3b154569
SHA127c166e0b570ea3cbce35c0568e9c04f7ce62f3c
SHA256ef79782afd29b258b9f6f6b21115d6065a2a543d990d45d38b7556cae6c05999
SHA51220a44539ef1c9fb3e3c578d97ce392d07df0d4b3cc858ea24c345a4500cc7ea6f9361e37992aae637b25aee66f8f855537dc55e37558bffd4f37a6fa956cea7b
-
Filesize
6KB
MD590bf2aff1eed771a4c3b7e4ff5af2b0e
SHA118696db45cc4b9c8df7eaae136b781c9567bf046
SHA2561e434c285c66f7301bd65304c5d252d414d44efa321f9d2721667d70e0c8b660
SHA5125faa4fd9474e5811788fd975cf9ec6139b31e8b77ea8f4152c525b4e4b790a9894368effcd20eeb6dbe2d884bb65b423bb34c7c2e4e8e318bef5f90325349469
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD532f8a25af19334521e7823b873f48435
SHA1306487b8832ceafb81c8bb7b1d263dcb8820b2b2
SHA25617a7519768313ffaa3b7bdcbafb0fa91ad591909e755de933e5f7b51d7e5bf5f
SHA51236497ab1d69d39edf7dae09dc25b7e50b092af415ddef31df8335db2bacb26a492794fb0d2b1f61e22c745b035dd2d4098e77f9a6f94d8e6debf3e434e6fb538
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581f6a.TMP
Filesize48B
MD5544e27f865106b44e0ecd84ecf1bfd36
SHA1ea04bc3b5a9e92f9229669f7346c9190a9d41292
SHA2569a68c548ac6278ec08a5cbef86515818ba6c773bafab29b2c910c8df4da05023
SHA5125de6994ce4ca725b0c44fa4c8748b6ba36d797342a134dd9a539c5341a35dd3510b2fe8a4b7e0d708d4d1aa9f0c07f788f1fdc51904f2642084c3206bac1b828
-
Filesize
1KB
MD52b37b2f196df8ffed4ed603d6d151927
SHA12d90255830decf374abb749b175223b8c77fb8c6
SHA256e056945e4a5ef178bbaa88c7ea1d70a91b8e3f2ae7b353fdcc6294f78e2384a3
SHA5123e7de60355693fd1691153ec5734180d808582dd3b3ee65276603daa4c92847aeab5ae3b16b04fb01e36f2bde966722c3ae1ebacb426d91e352dc3c2cce30655
-
Filesize
1KB
MD54e021e7e62e9ea494e780cb6d40d1df1
SHA16111714798aa41011c61e6b061591a2ebf6d9d9e
SHA25653d7455c269980ca97b6188e7527c319a329d6064caeda9fb0cefaa9850ad3d9
SHA5128e7c2da1bc587fccda12bb7290f5223f63c34579aebbb375e87e477b2c46254dcc00b4c58fb0ce4ae0a346b6addfb76ab030a362323755919e059232fc291916
-
Filesize
703B
MD5625e2c52728c3ea8fd2fe34ae10629e1
SHA19c56128f7f1ffb7b5a4db8cf80c4d8b05f102ca3
SHA2560f670badcf94a573e7c109779028e6a440f647e4809bf7d93b0e9bf165c08984
SHA5128933b9e260d218af13e239714825755da8e3cae0b67f520fb9a7e695c063b61d072c343a410553dde3565923226129309f1376022c548f1d78bbf9c57a96569a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dae85d0cc56788b68569c87dc7dee0e6
SHA126d062230296742c1a070d4438d4597a4b9cc3a8
SHA256fc4585cb2e39dc946064dc38dd54c2727ec580916a1beb8ed396952ea9c59d8c
SHA512391de388258500d5cfb4ac1de0485f4a4a06a92051258b2be3abb90d1618c41f0c466918c8bdf0e2ab70f67d849d0af4cea04779939d37e0156d70353cfedf7a
-
Filesize
11KB
MD550ae47ee82312e93820bc7fa0f8ecc11
SHA18a327aa847339dfdefb3eb5a3cd1bb74d158b2a3
SHA256732a713efa3e7072a2596e74e575b3dd2439a2d6623c1986cc2307a6418401f7
SHA512c9c2c836c39ccc8c74fe6ebb95960ea9bc36b8bd0eaaebf8791b01833b6170539acb05145c44caca2d1bbe19bdc64f76942144408f1da8a37bb35dae3151834d
-
Filesize
357KB
MD5c9b25c1bc4eb54124dad046b3b9e4241
SHA19e075389a2f34e224a68f84a1c5bb4d665077180
SHA256620b80bcb9f45c4f6f8a0f2c503b4c639deb22c8b2d46d53261f695b51c2b0be
SHA51275daa5a302e7faa1bca08b5f3101b757c07fe844945557b656143b85d37cf1fb0c45e51592d41a50827c0a2871bb9dfeaed502b5971efa4a307f7ade39bdd52d
-
Filesize
4B
MD5c6bdbc9d86009ccf7e8de878c9603213
SHA12a4b8716f978f2d107bcd8294b486a5ee45afe6e
SHA25636a067fdfcee95eb270f0b72e3b9e40d52c907d749fb9a8490d82f8ee56b29eb
SHA512c42a52cd8837e2533b3d5ec97639f0c94287e3d7a6c73635c21df50eba8483b60df15bf262a308836875cd9afed504e7f98a2f6b254e4181fe548b1853d42256
-
Filesize
118KB
MD526a714bab0085d5332d0f9a6c574f914
SHA12bcab5225ac0a340eeece65076c88bef3f8711eb
SHA2562f89136b4fa0b2fa4d5ac7dfa3d3001c603d0fcf198891f4f0dfc40563a1c066
SHA5127ee8516f9a25a40ee0ab89168ed5d81d702c3959c4877004a8237250aa007030ad538a1114b511d423c1cb94a22785d9e1a91ffe04b981ffa5fadd6e8e7e615c