Analysis

  • max time kernel
    68s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10-jp
  • submitted
    17-09-2021 13:51

General

  • Target

    http://usps.com.manage.inventec.com.hk/usps/

  • Sample

    210917-q54qdafge7

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • Registers COM server for autorun 1 TTPs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" http://usps.com.manage.inventec.com.hk/usps/
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffd4b5ea380,0x7ffd4b5ea390,0x7ffd4b5ea3a0
      2⤵
        PID:3636
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:2
        2⤵
          PID:4368
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3408
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 /prefetch:8
          2⤵
            PID:3532
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:1
            2⤵
              PID:3572
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:1
              2⤵
                PID:3048
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                2⤵
                  PID:4408
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:1
                  2⤵
                    PID:3176
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                    2⤵
                      PID:3268
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                      2⤵
                        PID:4048
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5352 /prefetch:8
                        2⤵
                          PID:5072
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3196
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5592 /prefetch:8
                          2⤵
                            PID:4684
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5756 /prefetch:8
                            2⤵
                              PID:3312
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5588 /prefetch:8
                              2⤵
                                PID:1120
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5876 /prefetch:8
                                2⤵
                                  PID:2852
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5852 /prefetch:8
                                  2⤵
                                    PID:4600
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5840 /prefetch:8
                                    2⤵
                                      PID:4980
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5880 /prefetch:8
                                      2⤵
                                        PID:4324
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5848 /prefetch:8
                                        2⤵
                                          PID:1904
                                        • C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe
                                          "C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel=stable --force-configure-user-settings
                                          2⤵
                                            PID:3668
                                            • C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe
                                              "C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6bb0f6ee0,0x7ff6bb0f6ef0,0x7ff6bb0f6f00
                                              3⤵
                                                PID:4988
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5972 /prefetch:8
                                              2⤵
                                                PID:3832
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4768
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5892 /prefetch:8
                                                2⤵
                                                  PID:3208
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5732 /prefetch:8
                                                  2⤵
                                                    PID:1244
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6236 /prefetch:8
                                                    2⤵
                                                      PID:5036
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6952 /prefetch:8
                                                      2⤵
                                                        PID:3864
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7100 /prefetch:8
                                                        2⤵
                                                          PID:1792
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6232 /prefetch:8
                                                          2⤵
                                                            PID:4540
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7368 /prefetch:8
                                                            2⤵
                                                              PID:5072
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7380 /prefetch:8
                                                              2⤵
                                                                PID:5112
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7520 /prefetch:8
                                                                2⤵
                                                                  PID:2540
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6156 /prefetch:8
                                                                  2⤵
                                                                    PID:1128
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6748 /prefetch:8
                                                                    2⤵
                                                                      PID:4672
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6744 /prefetch:8
                                                                      2⤵
                                                                        PID:4116
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5716 /prefetch:8
                                                                        2⤵
                                                                          PID:4476
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7976 /prefetch:8
                                                                          2⤵
                                                                            PID:1676
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6796 /prefetch:8
                                                                            2⤵
                                                                              PID:1472
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6504 /prefetch:8
                                                                              2⤵
                                                                                PID:5060
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7792 /prefetch:8
                                                                                2⤵
                                                                                  PID:1264
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7888 /prefetch:8
                                                                                  2⤵
                                                                                    PID:4324
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7816 /prefetch:8
                                                                                    2⤵
                                                                                      PID:3668
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7844 /prefetch:8
                                                                                      2⤵
                                                                                        PID:1332
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6516 /prefetch:8
                                                                                        2⤵
                                                                                          PID:3656
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8608 /prefetch:8
                                                                                          2⤵
                                                                                            PID:4932
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8624 /prefetch:8
                                                                                            2⤵
                                                                                              PID:5136
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8216 /prefetch:1
                                                                                              2⤵
                                                                                                PID:5232
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:5248
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:8
                                                                                                  2⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:4844
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1476 /prefetch:8
                                                                                                  2⤵
                                                                                                    PID:1692
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1684,3703861576813757077,2548779829268772662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6452 /prefetch:8
                                                                                                    2⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:1284
                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe" /update
                                                                                                  1⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5752
                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe
                                                                                                    C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions
                                                                                                    2⤵
                                                                                                    • Modifies system executable filetype association
                                                                                                    • Adds Run key to start application
                                                                                                    • Modifies Internet Explorer settings
                                                                                                    • Modifies registry class
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:5940
                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\FileSyncConfig.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\FileSyncConfig.exe"
                                                                                                      3⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      PID:2692
                                                                                                • \??\c:\windows\system32\svchost.exe
                                                                                                  c:\windows\system32\svchost.exe -k netsvcs -s seclogon
                                                                                                  1⤵
                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5912
                                                                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe
                                                                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"
                                                                                                  1⤵
                                                                                                    PID:6056

                                                                                                  Network

                                                                                                  MITRE ATT&CK Matrix ATT&CK v6

                                                                                                  Persistence

                                                                                                  Change Default File Association

                                                                                                  1
                                                                                                  T1042

                                                                                                  Registry Run Keys / Startup Folder

                                                                                                  2
                                                                                                  T1060

                                                                                                  Defense Evasion

                                                                                                  Modify Registry

                                                                                                  3
                                                                                                  T1112

                                                                                                  Discovery

                                                                                                  Query Registry

                                                                                                  1
                                                                                                  T1012

                                                                                                  System Information Discovery

                                                                                                  1
                                                                                                  T1082

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
                                                                                                    MD5

                                                                                                    7eacab519c71e8de7f576582521f272f

                                                                                                    SHA1

                                                                                                    b0f999df0a5322204ec2b9cb77c56940269f1fd2

                                                                                                    SHA256

                                                                                                    7cfae26fcb26b983296b1dd7c40308f862fe0e42ba9141b423f6e39a5a558061

                                                                                                    SHA512

                                                                                                    b8801a03aea323f8c14f3c90be4720e78bec5f8d5ee7ec2f25707e18e1f285ba607760c4cb2e153c0e193d0d864dcc4f1b3f38874ace04c08f11b15d1f37469d

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\FileSyncConfig.exe
                                                                                                    MD5

                                                                                                    482f6e8cdb127285f003a1e735a3791e

                                                                                                    SHA1

                                                                                                    24205c984f66bf5701e123f6b189699551553936

                                                                                                    SHA256

                                                                                                    a2e7f10da89bb038118a08699a32fe59861304ecd206d2d0f60f966514172559

                                                                                                    SHA512

                                                                                                    20e95b9e19d116239720261af25c66ffa9ae4eb1483af689e374f505d2e1af811bbb28f04f2bdd126f43180cb312375797ec0c193ce5d52cc3757d5a197daf5a

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\LoggingPlatform.DLL
                                                                                                    MD5

                                                                                                    f5fe453d483dca5a85fdd74bbbb7cffa

                                                                                                    SHA1

                                                                                                    c7cd1089b520a7a21bdbe84a311b86f4c395a550

                                                                                                    SHA256

                                                                                                    5cbe72a49f2f4a821768e978a7c1426f46d1f73d2bb07325e85b20ada8eb514a

                                                                                                    SHA512

                                                                                                    6e4490d3b09ad3289892eb63f0c2978347095aed0ee282bfe69c5e599735db8a0494c9d0d25e14a2f09ab0c25c2ea75d91e5753c5b9a77ef1d7e647600a77a71

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\MSVCP140.dll
                                                                                                    MD5

                                                                                                    0c6f22feabe8f0fe0f4fca7406e19e48

                                                                                                    SHA1

                                                                                                    c1ff9723bb6c25d27704086521767822b2eb3450

                                                                                                    SHA256

                                                                                                    2895cd42592984d436de580e4ffe64dceaa7fde7c1a1579351d76c6c886432cb

                                                                                                    SHA512

                                                                                                    d58a7ea83e8675ed9d0736760c756642869f4c6c4343432b36605ab1711d65e60a01520f3daafb0023d9add6e7b87887e8f8dc28fc258fbfdc3b1ebfe6a9cedb

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\Telemetry.dll
                                                                                                    MD5

                                                                                                    7bfedf5e7dda62c9014fb4b07f8d7814

                                                                                                    SHA1

                                                                                                    b3bb93818b1c482cff1e965599678ae91fb5ffa9

                                                                                                    SHA256

                                                                                                    a6c2d9050758272d0b43a68f3e50925c65b11353776ec7b8a52a4095c9ba6b39

                                                                                                    SHA512

                                                                                                    de4a7596e4031e2cd91c4484ae3eba873ac96cc96ed54221d2d766010407d83211cd00ad49afb7a4cee1eafc4a3fc46ed0d92c2e30c32e0fe76ae9212e213a9a

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\UpdateRingSettings.dll
                                                                                                    MD5

                                                                                                    5888321cc9a6abd980e76b8e359f5cc2

                                                                                                    SHA1

                                                                                                    8b0cf82d39f5c45d710f962bd305fe3aa89c30cd

                                                                                                    SHA256

                                                                                                    0be7e06ff418080feb0cda6d063ac3389028e7c539c88d7a2a5a4706c56f4d7c

                                                                                                    SHA512

                                                                                                    3e56b88f09eaf86b4e05746a1f228be472bd0f6e30b2a66f4319783d03dd21f0ece1d8eef9ca89018cc38117fa27cc6f01e1bebe1450b857205a998542a5390c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\VCRUNTIME140.dll
                                                                                                    MD5

                                                                                                    b33654014faaa8eec2d2985d45fd0792

                                                                                                    SHA1

                                                                                                    b43ce9aa087b18928c1d251205f8cbddda960530

                                                                                                    SHA256

                                                                                                    2cb10ea301da2f6484cf9dbac28d334b10a0bc57df2ad92660bbd01f3c43b268

                                                                                                    SHA512

                                                                                                    66f1df58db0a1faf6bf1e5bf22c1521042f52b38b1cdb4868db9925e800c55a47b23e5d25da9ffad741a3ae8c5678861c3b35c10aa61a2c3858338f841b42702

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini
                                                                                                    MD5

                                                                                                    b84258c0bd43b91267160cfb2a311007

                                                                                                    SHA1

                                                                                                    2df854f9dc991f9f8820f1a390d6ec14c125e85b

                                                                                                    SHA256

                                                                                                    0bd9892466be1de329309e5014495eaeb231e383bdb69dd16a9c9854149b93b8

                                                                                                    SHA512

                                                                                                    4be214b710f6c1b3c0c72ebc66795c1d895b5c0c47fed20eacbd5c54024f276f26e8a5d40d016da8bf59bce4431b20fcd201f99faac92910663e333ad81ac2b4

                                                                                                  • \??\pipe\crashpad_3716_ZBUDYVUJMYOMOUPH
                                                                                                    MD5

                                                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                                                    SHA1

                                                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                    SHA256

                                                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                    SHA512

                                                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\LoggingPlatform.dll
                                                                                                    MD5

                                                                                                    f5fe453d483dca5a85fdd74bbbb7cffa

                                                                                                    SHA1

                                                                                                    c7cd1089b520a7a21bdbe84a311b86f4c395a550

                                                                                                    SHA256

                                                                                                    5cbe72a49f2f4a821768e978a7c1426f46d1f73d2bb07325e85b20ada8eb514a

                                                                                                    SHA512

                                                                                                    6e4490d3b09ad3289892eb63f0c2978347095aed0ee282bfe69c5e599735db8a0494c9d0d25e14a2f09ab0c25c2ea75d91e5753c5b9a77ef1d7e647600a77a71

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\Telemetry.dll
                                                                                                    MD5

                                                                                                    7bfedf5e7dda62c9014fb4b07f8d7814

                                                                                                    SHA1

                                                                                                    b3bb93818b1c482cff1e965599678ae91fb5ffa9

                                                                                                    SHA256

                                                                                                    a6c2d9050758272d0b43a68f3e50925c65b11353776ec7b8a52a4095c9ba6b39

                                                                                                    SHA512

                                                                                                    de4a7596e4031e2cd91c4484ae3eba873ac96cc96ed54221d2d766010407d83211cd00ad49afb7a4cee1eafc4a3fc46ed0d92c2e30c32e0fe76ae9212e213a9a

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\UpdateRingSettings.dll
                                                                                                    MD5

                                                                                                    5888321cc9a6abd980e76b8e359f5cc2

                                                                                                    SHA1

                                                                                                    8b0cf82d39f5c45d710f962bd305fe3aa89c30cd

                                                                                                    SHA256

                                                                                                    0be7e06ff418080feb0cda6d063ac3389028e7c539c88d7a2a5a4706c56f4d7c

                                                                                                    SHA512

                                                                                                    3e56b88f09eaf86b4e05746a1f228be472bd0f6e30b2a66f4319783d03dd21f0ece1d8eef9ca89018cc38117fa27cc6f01e1bebe1450b857205a998542a5390c

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\msvcp140.dll
                                                                                                    MD5

                                                                                                    0c6f22feabe8f0fe0f4fca7406e19e48

                                                                                                    SHA1

                                                                                                    c1ff9723bb6c25d27704086521767822b2eb3450

                                                                                                    SHA256

                                                                                                    2895cd42592984d436de580e4ffe64dceaa7fde7c1a1579351d76c6c886432cb

                                                                                                    SHA512

                                                                                                    d58a7ea83e8675ed9d0736760c756642869f4c6c4343432b36605ab1711d65e60a01520f3daafb0023d9add6e7b87887e8f8dc28fc258fbfdc3b1ebfe6a9cedb

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\msvcp140.dll
                                                                                                    MD5

                                                                                                    0c6f22feabe8f0fe0f4fca7406e19e48

                                                                                                    SHA1

                                                                                                    c1ff9723bb6c25d27704086521767822b2eb3450

                                                                                                    SHA256

                                                                                                    2895cd42592984d436de580e4ffe64dceaa7fde7c1a1579351d76c6c886432cb

                                                                                                    SHA512

                                                                                                    d58a7ea83e8675ed9d0736760c756642869f4c6c4343432b36605ab1711d65e60a01520f3daafb0023d9add6e7b87887e8f8dc28fc258fbfdc3b1ebfe6a9cedb

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\msvcp140.dll
                                                                                                    MD5

                                                                                                    0c6f22feabe8f0fe0f4fca7406e19e48

                                                                                                    SHA1

                                                                                                    c1ff9723bb6c25d27704086521767822b2eb3450

                                                                                                    SHA256

                                                                                                    2895cd42592984d436de580e4ffe64dceaa7fde7c1a1579351d76c6c886432cb

                                                                                                    SHA512

                                                                                                    d58a7ea83e8675ed9d0736760c756642869f4c6c4343432b36605ab1711d65e60a01520f3daafb0023d9add6e7b87887e8f8dc28fc258fbfdc3b1ebfe6a9cedb

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\msvcp140.dll
                                                                                                    MD5

                                                                                                    0c6f22feabe8f0fe0f4fca7406e19e48

                                                                                                    SHA1

                                                                                                    c1ff9723bb6c25d27704086521767822b2eb3450

                                                                                                    SHA256

                                                                                                    2895cd42592984d436de580e4ffe64dceaa7fde7c1a1579351d76c6c886432cb

                                                                                                    SHA512

                                                                                                    d58a7ea83e8675ed9d0736760c756642869f4c6c4343432b36605ab1711d65e60a01520f3daafb0023d9add6e7b87887e8f8dc28fc258fbfdc3b1ebfe6a9cedb

                                                                                                  • \Users\Admin\AppData\Local\Microsoft\OneDrive\21.160.0808.0002\vcruntime140.dll
                                                                                                    MD5

                                                                                                    b33654014faaa8eec2d2985d45fd0792

                                                                                                    SHA1

                                                                                                    b43ce9aa087b18928c1d251205f8cbddda960530

                                                                                                    SHA256

                                                                                                    2cb10ea301da2f6484cf9dbac28d334b10a0bc57df2ad92660bbd01f3c43b268

                                                                                                    SHA512

                                                                                                    66f1df58db0a1faf6bf1e5bf22c1521042f52b38b1cdb4868db9925e800c55a47b23e5d25da9ffad741a3ae8c5678861c3b35c10aa61a2c3858338f841b42702

                                                                                                  • memory/1120-202-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1128-291-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1244-251-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1264-326-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1284-399-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1332-338-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1472-315-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1676-311-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1692-395-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1792-265-0x0000000000000000-mapping.dmp
                                                                                                  • memory/1904-227-0x0000000000000000-mapping.dmp
                                                                                                  • memory/2540-286-0x0000000000000000-mapping.dmp
                                                                                                  • memory/2692-376-0x0000000000000000-mapping.dmp
                                                                                                  • memory/2852-207-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3048-141-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3176-150-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3196-188-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3208-246-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3268-154-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3312-197-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3408-123-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3532-128-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3572-133-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3636-117-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3656-346-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3668-231-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3668-334-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3832-238-0x0000000000000000-mapping.dmp
                                                                                                  • memory/3864-261-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4048-162-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4116-299-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4324-329-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4324-222-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4368-126-0x00007FFD650F0000-0x00007FFD650F1000-memory.dmp
                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/4368-122-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4408-145-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4476-306-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4540-271-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4600-212-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4672-296-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4684-192-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4768-240-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4844-391-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4932-351-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4980-217-0x0000000000000000-mapping.dmp
                                                                                                  • memory/4988-234-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5036-256-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5060-321-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5072-177-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5072-276-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5112-279-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5136-354-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5232-361-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5248-364-0x0000000000000000-mapping.dmp
                                                                                                  • memory/5940-374-0x0000000000000000-mapping.dmp