Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 13:43
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s3.amazonaws.com/appforest_uf/f1664449175010x821329759123860200/cameo_script_shared_file.html#nani?margaret.hegeman@dot.wi.gov
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
https://s3.amazonaws.com/appforest_uf/f1664449175010x821329759123860200/cameo_script_shared_file.html#nani?margaret.hegeman@dot.wi.gov
Resource
win10v2004-20220812-en
General
-
Target
https://s3.amazonaws.com/appforest_uf/f1664449175010x821329759123860200/cameo_script_shared_file.html#nani?margaret.hegeman@dot.wi.gov
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 138 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e86acde3d4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371317727" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F639A797-40D6-11ED-B696-520B3B914C01} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3402595567" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3402595567" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f676cde3d4d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987491" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987491" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000004cfc8d0dc2d5fadcc28fcb30d38c1ae888b900cc5ffed2e1ecb5edbde5272182000000000e80000000020000200000002679f6f1e2b1885fcb51e8404a7f2fefda87cefe2d071001b9ff7fcb1eb5e5fd200000004fff3c280672deaf153e52d91bc6d628a317261898b86c2949566954076c549440000000b85d3c118179755042be9ee3936d5c930d947d7850cfdb6669cde7181cd35f17840c474d25271800041687bb8f78f52648d80d967fd43b5650ff0cd5df5739b9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3410122975" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987491" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000000029a283e0d68a2c6e1db47b9d1031b6e3491118d9a0f66950c74663d7055206000000000e800000000200002000000049b0e9dde23cd59a31acd0cd383e49afa62842a50a7bf51b7711dc985a5df43020000000e97661f49e30f95e84ce54e168853b953d109a88684c6badfc79fb261f1cd51a4000000039a4bc89da419852cb9738491f03bac0a78e309c1aca89ce497f7729f48059b9099c5bb9c70daa0b0782bfae2674070e371b6078593c22b7d7cd9ceffd37588b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 4196 chrome.exe 4196 chrome.exe 3960 chrome.exe 3960 chrome.exe 4520 chrome.exe 4520 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
iexplore.exechrome.exepid process 1436 iexplore.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1436 iexplore.exe 1436 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 1436 wrote to memory of 1788 1436 iexplore.exe IEXPLORE.EXE PID 1436 wrote to memory of 1788 1436 iexplore.exe IEXPLORE.EXE PID 1436 wrote to memory of 1788 1436 iexplore.exe IEXPLORE.EXE PID 3960 wrote to memory of 4816 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4816 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4740 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4196 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4196 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe PID 3960 wrote to memory of 4932 3960 chrome.exe chrome.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://s3.amazonaws.com/appforest_uf/f1664449175010x821329759123860200/cameo_script_shared_file.html#nani?margaret.hegeman@dot.wi.gov1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffd87174f50,0x7ffd87174f60,0x7ffd87174f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1640 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4532 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4452 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4652 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3280 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3268 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5000 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,3104434708218824669,5580745322118071206,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD510c41d661eaaab85f4c2288ff6be5398
SHA1e24d3eb520e4af5372d3d9fab1cff6a5a528ec83
SHA256c3118f7de17ee4fd83d30bef75f61ef171ed176dbb54630292b2b5f1a23d9ba2
SHA51274d13cedd42c2cd6ac1719e296e69f554cf71a7e8bcacc27c2d93d41b2f3b3ec0f865f92ddeb0bf116c905c9b7faa15c5d5e18955cc61495221f8a8da212ec5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
1KB
MD5aa66b10a00c7f2e754c693c53119cf3b
SHA11b7cf858834dafe00b05e53df35cdeb9d6cae312
SHA256cbb46be3018530b107283740c51e3514bfecb1a5cff3b185d75459d447bbeaf0
SHA512d7530f3366df70b300b35ce83bb21f4e129cbca9baf9f67cc5215e597bc6888fcf270db2ea4457902fa4f04e22ca1d410ce36bdef42b2ac6e8ebaa16d8d57023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5b471dd02d20e38a6695cf3cdb539ce96
SHA1d5006f272254f2639c3b7cd53a4a623aee592ac5
SHA256b6f5d3c2883398ddf4f651161f90a7c85469e1f9d764de6f8481845951d1d149
SHA512a8f8e19635caacf0ba160c9f502514542c9e785070aea3976be688dba8e1bb8a8b0483c286484d619451d47e3f3236bc9f44177d0f8ccd0c5a064f7aa890cf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4FFilesize
1KB
MD5d6b03d7ffef1aa5dcc87f1f6ba7d6363
SHA198d2214377d5ae03e472a960691ea10dc3ec3e7c
SHA256f629c5e40670fb78d9b84516e206de5a935823c4c514d91c112054f3b766c103
SHA512c802aec2e052d36e73d9533e710622f826e95ee4d40388df13eb28b269640a0601790146adb4ce8052ef761cb8569b5a64f275a54e44e4d85a28195af722f612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_B13E2B48FEEE7ABC0415719489CB444DFilesize
471B
MD58f6d8966dfa76568d76154e572c62f12
SHA14fad7ad7efceef0b5b95a5cbfae66a1936e27116
SHA256e008aa7603aaf530aaefe8bbcdeb0ade75488f4767d8367b22e4a3ad7e1a6191
SHA512f8673fed853a3990d6db03667249914ffc8d7f361321e013971f16b33154e60e366ff9500bddbe58682562a95d2aaf2c8cbfb765cab8675e6c605a51f532ead0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_F41CB9562FD1A2A97F6540105AA4FF7BFilesize
279B
MD53890d0f6ba1a59218ec08e469bd7649c
SHA126296c4cab5be8b3d8f3ebc8cf00ace3c270bef7
SHA25677f10f2b1f344f9bfa19316f16eea4f3ee7ca0f07a0129b50b2bc92f70a8fe48
SHA512999edf9d8751830d039e5c50eac53b6f86a6079b11f3bea7e7487f5257748fc88ea5c3d255d7d1b12ef05e31107c1eb4bda34d31b0ffae8fcd681b2f5ab5d181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_D2A36BFFF0D303240FC776EF3238CCA0Filesize
1KB
MD5133e430321c94c77174a421688ec3c53
SHA146a25698863d1dcadc9f83b6f8f5dba4a6d7eb14
SHA2569e86dc2a0161e27765f2dea63d5d4fa47f86a6eea254ac75a2a0ab3a0e949444
SHA51204708560e4865754984e9f4424fde1a3c4c30b4d2bcdfecec4ffc2f5bdaff13f41c6735cc72a8cbe773f7fe8431cc10adbfa1af71d5b3986f71a77848992c5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62Filesize
1KB
MD5cc8f2ff61265a2a7b6629503184cbe54
SHA14c3b688a15854264793db5bc3991d2f62c08d607
SHA256552f6c8e4d8b615b0a4f40ed89f225d4dc7ef7fbe8eacc253bda1cb0264edb06
SHA5121731c8126d40e203f9d87d5237eb6d44a84d3f87ff64cae85424270cb850be404273522cad33fbb6a837151b4bffddf5c339889ecbe7db2dfa837245117e32ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894Filesize
1KB
MD55e217e16352a5d22dec80121a2fb6d3c
SHA15976515dc6d30bad1e6cd340e9fefc29cb907d2d
SHA2560bdf496959b947532784eb7883764298bee6b555dda12a42ff9755e22ccbb1a6
SHA512e6b217c9ace6f1b9f036ff8c84679b1fc1c055cf88ce807ea7f3e74fa4fbaa272741495702fc1971ca99a44360ea761fe8c86a48d926b276ebcc4434f9e89d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD55a11c6099b9e5808dfb08c5c9570c92f
SHA1e5dc219641146d1839557973f348037fa589fd18
SHA25691291a5edc4e10a225d3c23265d236ecc74473d9893be5bd07e202d95b3fb172
SHA512c2435b6619464a14c65ab116ab83a6e0568bdf7abc5e5a5e19f3deaf56c70a46360965da8b60e1256e9c8656aef9751adb9e762731bb8dbab145f1c8224ac8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3Filesize
471B
MD586e0fe14ac54b7b9131a460fd65d73fd
SHA149ec80657f4183e2ad7e906583b94cbf48a94809
SHA2569f30a1437666225f096d72763cf89a4e5ae9e5f501ffed4becc51b08c515cf6f
SHA5124898fa340db493a074103fcf9040584dc05286b299ef832fe0f756133b56d24df191b606e367e8417a6e4a57703fb0a5ec4dfce91b227c6e077eb7b66ce45f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD55cd7fc8ab7037b0d8442a79de433fb4c
SHA1f469be10fe094f22b15eb39e552b1e5f5a4e1e17
SHA25626f973c24a725e345a140fbf0a1842fa7e25bf920c56ef6a31e0abf8e4e05f2a
SHA51275b777de3f726ccb6833a8d0de22bdaa9356939adf94a0acb8d31549a46ee134ef2a61e0611afe143f6202e9e0ca51d7915b66d76118b09e06cc61fad8f2a7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5fda71209d434a60ec692e0527f028c7a
SHA198863bb1b4b3d7f783250226bb8b1541afc0a772
SHA256693aefeebd1a9f787d7d017beaf99719490f76b2d337ab630cfb3272e695408f
SHA512aa3062da7508e9281d83b5669eaf74ea73039f3da2c0933ebb8882e7e20b704d4d1e2f7681e7fe5abd1262c53f1b4130fa713274622fd31059a27beb39086949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
408B
MD51e7ab13dfad1184f247ccfd9b5664ec7
SHA1dccab23dacbfdac67e35fa364da0df2bf6ad81e9
SHA2560711fa63a660bd7f3f26b4ca3ef6284a1717008ead8ea8954ad6ad39922f7ef0
SHA51249f6eaa58e4bbb0f3675b292a825a5822cd742eac8132faa037fd4d923bd9013958a54ead97cd5972c28e9346a631a46a2b0ecc0033f1c84cfa61deb3a0171ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD5ddda44d7af4797020364dc6a39f8be8c
SHA14ccac5399289f7c628fe9da841a316d3888a7508
SHA2567b58565691d695b6f9858c967a827f863fdb99cb278b7d3c0f86ff6f633f8f8a
SHA51215a1ec187692ee1bcc201449f8fa12b05cbe0b3cc5369cb18aa2a06038f7f17f7ff573837b3110d9f5e9aecb49a2665f000ca66a16b3a7ba22c17c81aefcefe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4FFilesize
442B
MD5b0d6e30c6f78b16b14afc00d82276f0f
SHA1aa336dbad4d82b506f51d8aaf28ba7906710703f
SHA25632c86952e78ce4b146222cb548ebf34bb976b332fd4f1236ad23a98a2ba114d4
SHA5122c06d3962f8bb4398c0d3b6479b12a1d3307b7386917c538ffb07539999db6996790e84512f59df409dc4d7831b90ebdb6ba95800ac78a9859b2c4b8aa09e666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_B13E2B48FEEE7ABC0415719489CB444DFilesize
418B
MD5fa4427b6b002250d38d430d1f4fb07bf
SHA175b1892f880623f2a5a7dad783fe94271701c882
SHA2561f6c99749b6599f048e05b09680c441517aac5af8dd123568c01da71efa545ec
SHA5124f2b10d404603c1c97e4b025fb190a9f31795a95ebfe7116cd18f27c36cb6eb1ac11fe4ac456248b922287ab207e7e1b20665ee41e94de43e75cde74a92d0ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_F41CB9562FD1A2A97F6540105AA4FF7BFilesize
404B
MD594e2acf67831b7c81b93c9140d86e04f
SHA1c289772ecac61aa750c0e9c6779893b44b290e23
SHA25630d8e25d4d9900ada0e62a3787d77d0f39e1ccd07a2907b92f7e2d2462ffcbd5
SHA5122f3f1c9d8c7a6411ad08bee83ef2e5fa1429c7d4a8166b6294d4ab089e2bc5294a63605acd6fb95cc1eab0b0d7bfa43c8af3dea53e4ca08d76b3aef9963cc28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_D2A36BFFF0D303240FC776EF3238CCA0Filesize
510B
MD576f8c1da08ec4b508791bb4ad2f76756
SHA15fa61dcff6dc5fbf8e4ed5fc60909c60c969ddd7
SHA2568d2bc62f6f5fd5e762a4e30862ac5bb2969667b12c8df3c390f8760bce695f96
SHA512a1c3fcfbb30a806883721b8e3238750958231d0727cdf015c376b62b8d73f3ea008e10a01130200dbb22da7523909dcb2a19c3ed04e682cd2db3b771be2a2c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62Filesize
458B
MD5037d62d3af67a9facaf1f491ae3a64bd
SHA17463110d70b193a0336647cacc7ebef5b6dc5ddb
SHA256ef066a2537f27ca3f7c1fbade55a6c981a17e7a314a15b6334ff4f3bcf591cf5
SHA512de74026c62d89182c5b13e6e7d4c14d7c115999b6388282965e7a538c8fe5c681b49d9dda6372d1cfc68cb8adde0da920ace7ad18a5e87a6e938f25811302eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894Filesize
432B
MD57b8e65ed1e92190c5efc45bf3c38cb97
SHA1438e6a209e30e17ff7a752a56d582a1eca36656c
SHA25631cd4d4fc6435ea244e1915ee394d266b40bfd251bb8b2821fb89b8be71cbf5d
SHA5124b9d39e70a66e2c46053ebd676c90cce8fa60e4fc2f8886cd2d4773af2a4ca599c61c08caa908ce7116b26dbe17c6ed4f9386ddf2b6035aa047d3ac68e40770b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD50530dd37cda7ce5114adac7638a2720a
SHA194631aeca830400173607ac70ba2f7bf3c9176ef
SHA256e0cf28bfed26281925e73caed722df5f2aa5f735cf0e57e841c9ecf8c835ace4
SHA5129f8a2fc506d6e28d2fbabbeee7ee5998d9e288b0ca14999312cb143cd2045f22e7bcbc48df2c443bd10aedfeb0aee74145e866bb7db985006344de9c8db38ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D4DDF242A8972F898C0FE0D6EA6919E3Filesize
414B
MD50fbd4be7ebaad0adf0c0b3689c05ef7c
SHA1c8fbc825a3651c42f6fa59d146555663286aac9d
SHA256d55bb8476219306541a642fb366e901a3dd747008797e5d3dfc54fd7b5a37417
SHA512a211ab570024a2dc19f7c6cbcf3c8535e35c9ef355a1dda067b58cc030b5ff96916bdd51721379b4e8669023cfc8a36a766a79ecf62cad3a9961a247a2e02356
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.datFilesize
8KB
MD57c8d9cb4886849df40e000557902edd5
SHA1597069cb2b4f64ca03614c8ce6b4df5bdfddc4d1
SHA2566b632c4e967c3e7f453c5cb01aefad41d0a0c0b2a5e32b9756b121d0b550d8f0
SHA512af8c545e359b8add76b77ca8bbbf2c03c4ee409c39f87b78a00c4c970cb99e09713aa13ee286d020e6bd674162fe4874852198271c4a5aca6467939f351d95fb
-
\??\pipe\crashpad_3960_KUPQADXKCSTBXMGSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e