Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
test.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test.js
Resource
win10v2004-20250217-en
General
-
Target
test.js
-
Size
32B
-
MD5
c1d823b1ffe895f3649866762ab72a9c
-
SHA1
3364ff687f85ac9abf338334a2824de6e1b6adf2
-
SHA256
11cd2cbf2f7c8b3a02402aed347152e817bcaeb219485956f70fe419e34d751b
-
SHA512
ec2d3dcc3a29ead8c445e2627b35ebb99fefa49946a25c5431604be3524713ab1c254b237ea59495722b29455d504b7b8ec1c7f80b8106a95c478c178e4bf557
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 114 4724 msedge.exe -
Executes dropped EXE 3 IoCs
pid Process 5484 CryptoLocker.exe 4204 {34184A33-0407-212E-3320-09040709E2C2}.exe 2024 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 113 raw.githubusercontent.com 114 raw.githubusercontent.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:SmartScreen:$DATA CryptoLocker.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 800892.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 83997.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4724 msedge.exe 4724 msedge.exe 4704 msedge.exe 4704 msedge.exe 1776 identity_helper.exe 1776 identity_helper.exe 6128 msedge.exe 6128 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe -
Suspicious behavior: LoadsDriver 14 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3508 4704 msedge.exe 97 PID 4704 wrote to memory of 3508 4704 msedge.exe 97 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 924 4704 msedge.exe 98 PID 4704 wrote to memory of 4724 4704 msedge.exe 99 PID 4704 wrote to memory of 4724 4704 msedge.exe 99 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100 PID 4704 wrote to memory of 3988 4704 msedge.exe 100
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\test.js1⤵PID:2628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6ee446f8,0x7ffd6ee44708,0x7ffd6ee447182⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1964 /prefetch:82⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6384 /prefetch:82⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:5484 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4204 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2024
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6764 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD570413ce44ef31ef13b0d7ac8e65948bf
SHA163b08e51819a9b60231a1e9395abd38050e92a40
SHA2569b9dcc6fff7eb8b24b6fe45c29c184b4c6e61bcd5e3d88eb734dff7a3b06168f
SHA512a6b8368fcaeef82cbd0efdad5389a4caa8f7500f775f88d1335126f468cb63ef2bb1c8203dabcc5e6c4f7e2dc36f39b9cc152a65a8c625bbb7a403567b8544b3
-
Filesize
940B
MD50a0bfaf44026efa4d47e90728fb02b38
SHA1f2c4c893790777269ce44776b49f1ac408ae0249
SHA2565ffb41bf89095b99087b11105d804275fecdc02ca1cc13ff0b756f13a5394689
SHA512d11aff1f1d40063469bcc0a5720137f9c596a9943a1cac6747c3dc08f10b52775f7d213076b5ae37fd07384914f8c4bd7f735b765a72fb0fdbfddad0a114cc14
-
Filesize
7KB
MD564c8bdab6abd9a75468b312cf22e4802
SHA1f6b257a83228fbd80f6a9ec33ba4625a4076cc5b
SHA25659e271747839c6485efd94a9224db4d41b57a4c2898fe88003b1cd6e707332b2
SHA512f8dd3ca7d418ebe93fbb8c9641d8f3d516930db55685904e54158f15499837068ce68d333798343c48302cc4186a029c844e230a6c0b575c5ff43b95d6e8372f
-
Filesize
6KB
MD51e833f50a2a61591b558f2fb305a3f26
SHA15159aaca019905c6191ac1cec028657dc48eabfd
SHA2561bee9744137ad28dd5d2f6b7fb8ea8449a17e8c08ec66d6b48256447b9abe3f5
SHA512c85da6ef2c8b150b0c7cbe26193fb39b83fdc9da51bbd02ae8e6e1136c65cb0dc85f78bfc1cc4b78f3a8072d6bdd3db209611155452802c626fa204c2e2479a2
-
Filesize
6KB
MD50bb523f23cc491dd3124dbc26551e68a
SHA159eca1b7fa0780cc458d13fce3ff560d47462551
SHA25689ae87a87203cc06c7d870abe623847cd7a93c28eab4bb55f5543927a850c3b4
SHA51201dec8e166484c5917dc56670229dc50346dcf43b74e9c529ce3c24d27ecc5476a351b3d712cae3573741d721a4ca31ce9620145ecf73d90f530d76764069aef
-
Filesize
6KB
MD5e5df699c8c1d12bf6a04089ec61f5c1b
SHA1cc519bf970f6fd272d629ff3cfd70e79765802cd
SHA256ce9aab10335b192d8557602116399f47b4bde530eea0684b795a4c55327eb69f
SHA51211564e8bf8bd95420f96c4fd0b4c4b191138a6fb14cf574efab44dc49127d0c6fab22528ea5a5d4b8114a2aa7e5b5a57496f7f4b8dbee11d4f21133f02298cd7
-
Filesize
5KB
MD51b970c3b6f93c4ab225d0ce95fd3415d
SHA1589af3bf3c864f585bb36a9aa83748017f9ebe55
SHA2569ce92a0d75f8e89aee52412cbdf09824df04c7c294fc3c416f8d15fa844b04a4
SHA512193104e48517ea9fed65dca53d56eaf222ce7dc808c38907bef5f963b6228a1f2146e9695cc8bc3ec7d8c21e0cc316c7c02f748b699a758f9c8cb6b5e82580b6
-
Filesize
1KB
MD582708d677948aa644cd272cdfbfeccd4
SHA1722248c800edaa47bfb1384148152dddc9a204c3
SHA2569e5afe2be8e511c71ead3f692ce8fcbbe3945419259070877ce7b06d5e150eac
SHA5127b7189dae87088063c0e1295d5883102ad7f1abf13e086ae9944cd2a45c7e1aa04986a2ee0bcc5dcdb636cbd0c9bdf7ab5a0352a571e99f399986e37ceb6a9d9
-
Filesize
1KB
MD5f603dc19cba64ef58eb68538d2dd84c8
SHA1aeeaf7cc02db2a9a55db0f74a4d3d5329fa44070
SHA2563a392573a54cd9ab71849240780eeccd1b33074b393ccf8c67af8f77a6face42
SHA51228f3377406c13cb633d2bed850eaa15873889a066a09ddd9b938a45302508599c8d484e672005bbe1ad66a114b859c5222f40eb480947c83ea1620c021e7a1ce
-
Filesize
1KB
MD5e0d772416369bdeaf2d4c7b71f6ffba9
SHA1695848f4108d9e33b542c40cee14f41971a383f7
SHA256b4630e46f62a48025e8293cf9cd2e5824b9c71c0652f0e933352d488c8f99b5b
SHA512bcf6602d8c9d9674b720356972c54fd8e76329da7c3b92b4ecfd68ccfc70fc7cd2466b1fa2e69e1832d40975d70c846901e4a2ccb499197d950c6c018d052b9d
-
Filesize
1KB
MD5c46cc580871937f7856ebb8847b1f1f9
SHA117ec1e882c8c8a7d79ff8a5d922239232fea2a11
SHA2562fb74b77d748601244c92ae4ac801ee2b0d755511c4fac0853198001f87b1972
SHA512f111e65d9cd5512ed29a7db9b6683441cfc1cd4965de94897c9fc28f46783a2580a38538c5b39927956de56080ad7c2691854a8bb57933565a1a8cd4b129c7a0
-
Filesize
1KB
MD58f026b41802144f63fc2048b7b8f0baa
SHA1020b204bcf608793b8d68cbb1f276da11b03bec8
SHA256a9ad74680ecc3872c08b728e9d5ffbc72739c47cd92c7ae1e9421a582f72db8e
SHA5125f761c2c010911da0627d54682ca0d28abf10977414b57173cda455d337b0d8925080a75d6d9828d0d24bec128399b4fca30e1eb64a2c75ceb301d677648b689
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5a814aad7517888665757ab6827b6538c
SHA14aa460b36752a671221df6dec87b17e236eb70ff
SHA256cf741dd42b4fd23662b384b2771d7f2c99e86b897a8c966618fdaa678474b667
SHA512cfdc2dcdc60566f539e8ccf1e373d47d91cf7ffcf8cd1818f78bb3c7bfea1f2ff4bce90e5017165c0e5beb18055c904ff25b20cd1ea84c2971b025759540f682
-
Filesize
11KB
MD5f93b49ef172915fb030ee8155b042f84
SHA1c2e4a5d59f2cb32eef8db6fc654b60ccdc99ef19
SHA25605b6a6a2cbec330575fe22c44ea1a8d8b1ddf785e1a5f08e1016e6a4bf260200
SHA512373966fba782c48cd4eaf57e0caf8d4bc1705c3aa51a913cd69629148d1463bc3c9f702ff699edc2d267a048841db3925e3eaa8c727f57f45ea0c696e96a7358
-
Filesize
12KB
MD550da9d990bcd10d8673f28b09f499a8e
SHA1636ac78aeca8ec8276438dd2c3785364e9e7b6aa
SHA25602a543c5b2cc82a33531f9f34f46e28e9f92d2e5e8f5c5bf743e3c04b24613c2
SHA512f348c01e9719162f714808dd31abc46afca4fb57c2015d3f5a68cb1524f393805c5613aac08457fbbf16bc715ac58ff92294efc9e84093bc75f1d9cc6bbaf88e
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444