Analysis
-
max time kernel
2639s -
max time network
2669s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-03-2022 13:27
Static task
static1
Behavioral task
behavioral1
Sample
Win32/Backdoor.Win32.APT34.PoisonFrogC2.7z
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
Win32/Backdoor.Win32.APT34.PoisonFrogC2.7z
Resource
win10v2004-en-20220113
General
-
Target
Win32/Backdoor.Win32.APT34.PoisonFrogC2.7z
-
Size
8.8MB
-
MD5
3b6d4a4934ede73be196aa8a9bd83dc7
-
SHA1
6b91821f2be5586d6e10036d8fb6d52ad710124e
-
SHA256
00d7aa1301eb8fd81297223562b2bdcaaad25413698295cf189508f7be8e5e25
-
SHA512
9e0dad6f810b420f3247a631d101359c0e2217a744fad6c1e92967fbdf1a8f4638f8a4818723def3f96a116ae8fd0fcecd8e035b2ddbeeab11e15c793559f069
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
7z2107-x64.exe7z2107-x64.exepid process 4856 7z2107-x64.exe 4504 7z2107-x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
7z2107-x64.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tg.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2107-x64.exe File created C:\Program Files\7-Zip\Lang\tg.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7z.dll 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2107-x64.exe File created C:\Program Files\7-Zip\Lang\tk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2107-x64.exe File created C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2107-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 23 IoCs
Processes:
7z2107-x64.execmd.exeOpenWith.exechrome.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2107-x64.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2107-x64.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 1284 chrome.exe 1284 chrome.exe 3688 chrome.exe 3688 chrome.exe 3228 chrome.exe 3228 chrome.exe 4400 chrome.exe 4400 chrome.exe 4504 chrome.exe 4504 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 1872 chrome.exe 1872 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exepid process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exepid process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OpenWith.exe7z2107-x64.exe7z2107-x64.exepid process 3116 OpenWith.exe 4856 7z2107-x64.exe 4504 7z2107-x64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exechrome.exedescription pid process target process PID 3228 wrote to memory of 4368 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 4368 3228 chrome.exe chrome.exe PID 4072 wrote to memory of 4232 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4232 4072 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 3228 wrote to memory of 1420 3228 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe PID 4072 wrote to memory of 4136 4072 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Win32\Backdoor.Win32.APT34.PoisonFrogC2.7z1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc82aa4f50,0x7ffc82aa4f60,0x7ffc82aa4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1624,1521678806352944995,4777820227792589599,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1640 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,1521678806352944995,4777820227792589599,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc82aa4f50,0x7ffc82aa4f60,0x7ffc82aa4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1640 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4180 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1684 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1544 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5788 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4804 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5824 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5324 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2348 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5492 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6136 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4928 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4956 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4944 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4828 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4980 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4656 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4640 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6316 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2940 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵
-
C:\Users\Admin\Downloads\7z2107-x64.exe"C:\Users\Admin\Downloads\7z2107-x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4356 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4960 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1076 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4968 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4304 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4400 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3128 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3372 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3320 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6116 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\7z2107-x64.exe"C:\Users\Admin\Downloads\7z2107-x64.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
7bd7cb2ee623db5effb11919a9366f15
SHA13070a4ddd03b67d5b3cf7137c40866be2cebff63
SHA256f1cb00994c79572be4d7fb91e38c2ff65227ded8166b68c1c2f1272f3f6cd43f
SHA51296a957f29bf40bd818edfdb4ba70f8f0a8275e0374b9c7ae21eebc8fd8f4d290d7366d5a492ec0d99d9ad456eb852083b0bc50aa0677f4271277160c09af51fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
7bd7cb2ee623db5effb11919a9366f15
SHA13070a4ddd03b67d5b3cf7137c40866be2cebff63
SHA256f1cb00994c79572be4d7fb91e38c2ff65227ded8166b68c1c2f1272f3f6cd43f
SHA51296a957f29bf40bd818edfdb4ba70f8f0a8275e0374b9c7ae21eebc8fd8f4d290d7366d5a492ec0d99d9ad456eb852083b0bc50aa0677f4271277160c09af51fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
7bd7cb2ee623db5effb11919a9366f15
SHA13070a4ddd03b67d5b3cf7137c40866be2cebff63
SHA256f1cb00994c79572be4d7fb91e38c2ff65227ded8166b68c1c2f1272f3f6cd43f
SHA51296a957f29bf40bd818edfdb4ba70f8f0a8275e0374b9c7ae21eebc8fd8f4d290d7366d5a492ec0d99d9ad456eb852083b0bc50aa0677f4271277160c09af51fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
7bd7cb2ee623db5effb11919a9366f15
SHA13070a4ddd03b67d5b3cf7137c40866be2cebff63
SHA256f1cb00994c79572be4d7fb91e38c2ff65227ded8166b68c1c2f1272f3f6cd43f
SHA51296a957f29bf40bd818edfdb4ba70f8f0a8275e0374b9c7ae21eebc8fd8f4d290d7366d5a492ec0d99d9ad456eb852083b0bc50aa0677f4271277160c09af51fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateMD5
17e9549dd5ba1ccec3c80cf5363c3de4
SHA123d8265b634acf2a4424390b3f83081a135061ba
SHA2564a1f85c05848f4bc766dc7a5d086a37aa4af425ce893521722eac76aa76bf64d
SHA512f479a901dc55bf962898fbea429ed04cfd8fe86f00c690fc7661abafe1399ba462a0d62ca8ff0f911acfda6ef9ba9efc2ddb7c9d040ac3997464430d5433765e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateMD5
2167e53d9f3a7e3b29ded1bece216d77
SHA1e48dbad9cc80a57e6865ea8b9f942c5c2af2f143
SHA25607274ca3fb04bf0c3174e6f706e4e36c178fb4251b6d9063083e5ee7ce31d49c
SHA512c8a16120ef447241dd70c65f98207e2d03fb1c9bfa627e2ee8c31c893ccde58ffff40ea2c9716a2ba6681622499645bf60bf82ba0b9322a4273992d89a746429
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateMD5
17e9549dd5ba1ccec3c80cf5363c3de4
SHA123d8265b634acf2a4424390b3f83081a135061ba
SHA2564a1f85c05848f4bc766dc7a5d086a37aa4af425ce893521722eac76aa76bf64d
SHA512f479a901dc55bf962898fbea429ed04cfd8fe86f00c690fc7661abafe1399ba462a0d62ca8ff0f911acfda6ef9ba9efc2ddb7c9d040ac3997464430d5433765e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\CachesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\Downloads\7z2107-x64.exeMD5
49839f0c227b5f9399b59f6ae94a7c7b
SHA1332620e2e360d471736d714f3f5781354702d9a1
SHA2560b461f0a0eccfc4f39733a80d70fd1210fdd69f600fb6b657e03940a734e5fc1
SHA5124d406ddd257a28ab1521e0e28c20699a764d7a3d3c3651e9b080cbdb6dae2f7c348452b2946a1e16b00424f67b769fe44c54a9b94e9124fa219bbe2a544ee82b
-
C:\Users\Admin\Downloads\7z2107-x64.exeMD5
49839f0c227b5f9399b59f6ae94a7c7b
SHA1332620e2e360d471736d714f3f5781354702d9a1
SHA2560b461f0a0eccfc4f39733a80d70fd1210fdd69f600fb6b657e03940a734e5fc1
SHA5124d406ddd257a28ab1521e0e28c20699a764d7a3d3c3651e9b080cbdb6dae2f7c348452b2946a1e16b00424f67b769fe44c54a9b94e9124fa219bbe2a544ee82b
-
C:\Users\Admin\Downloads\7z2107-x64.exeMD5
49839f0c227b5f9399b59f6ae94a7c7b
SHA1332620e2e360d471736d714f3f5781354702d9a1
SHA2560b461f0a0eccfc4f39733a80d70fd1210fdd69f600fb6b657e03940a734e5fc1
SHA5124d406ddd257a28ab1521e0e28c20699a764d7a3d3c3651e9b080cbdb6dae2f7c348452b2946a1e16b00424f67b769fe44c54a9b94e9124fa219bbe2a544ee82b
-
\??\pipe\crashpad_3228_GATSVWTXPEBLASWAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_4072_DLBCOMQHOEKLIUWUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/4856-140-0x0000000000000000-mapping.dmp