Resubmissions
22-11-2022 00:51
221122-a7gqmagg5y 821-11-2022 23:09
221121-25dpqsed6v 1021-11-2022 21:54
221121-1slddace2y 1021-11-2022 21:30
221121-1crkfsge79 1021-11-2022 20:42
221121-zg8h4afe23 1021-11-2022 19:29
221121-x7e85ahb6w 10Analysis
-
max time kernel
301s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 21:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://45.95.169.45:23205/
Resource
win10v2004-20220812-en
General
-
Target
http://45.95.169.45:23205/
Malware Config
Extracted
bitrat
1.38
45.95.168.128:23202
-
communication_password
ed99c23d77796aac877ce1f91481dc28
-
install_dir
Oracle
-
install_file
java.exe
-
tor_process
tor
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
sli.exeservi.exetst.exepid process 2380 sli.exe 3668 servi.exe 5028 tst.exe -
Processes:
resource yara_rule C:\Users\Admin\Downloads\tst.exe upx C:\Users\Admin\Downloads\tst.exe upx behavioral1/memory/5028-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/5028-148-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
tst.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Local\\Oracle\\java.exe먀" tst.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Local\\Oracle\\java.exe瘀" tst.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Local\\Oracle\\java.exe" tst.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java = "C:\\Users\\Admin\\AppData\\Local\\Oracle\\java.exe준" tst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
tst.exepid process 5028 tst.exe 5028 tst.exe 5028 tst.exe 5028 tst.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 1888 chrome.exe 1888 chrome.exe 4648 chrome.exe 4648 chrome.exe 3092 chrome.exe 3092 chrome.exe 4276 chrome.exe 4276 chrome.exe 2640 chrome.exe 2640 chrome.exe 4528 chrome.exe 4528 chrome.exe 3708 chrome.exe 3708 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 3236 chrome.exe 3236 chrome.exe 4892 chrome.exe 4892 chrome.exe 2596 chrome.exe 2596 chrome.exe 4464 chrome.exe 4464 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tst.exedescription pid process Token: SeShutdownPrivilege 5028 tst.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
Processes:
chrome.exepid process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
tst.exepid process 5028 tst.exe 5028 tst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4648 wrote to memory of 4704 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4704 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4616 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 1888 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 1888 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe PID 4648 wrote to memory of 4240 4648 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://45.95.169.45:23205/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9072e4f50,0x7ff9072e4f60,0x7ff9072e4f702⤵PID:4704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1676 /prefetch:22⤵PID:4616
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:4240
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:2240
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2964 /prefetch:12⤵PID:4876
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4356 /prefetch:82⤵PID:4372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:2676
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:3648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:4968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:2740
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4488
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:5032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3012 /prefetch:82⤵PID:4900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Users\Admin\Downloads\sli.exe"C:\Users\Admin\Downloads\sli.exe"2⤵
- Executes dropped EXE
PID:2380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3116 /prefetch:82⤵PID:1600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:3304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2124 /prefetch:82⤵PID:2404
-
C:\Users\Admin\Downloads\servi.exe"C:\Users\Admin\Downloads\servi.exe"2⤵
- Executes dropped EXE
PID:3668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4232
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:2640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4532 /prefetch:82⤵PID:3380
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4364 /prefetch:82⤵PID:4204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4652 /prefetch:82⤵PID:2200
-
C:\Users\Admin\Downloads\tst.exe"C:\Users\Admin\Downloads\tst.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,14207317243165060060,16807495558318485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
7KB
MD5c73ce9237ea8bdee32f9174496cdcbb0
SHA10eee0b40dea781b6506c4cd9881fc7f1997e1efa
SHA256051bf8781fa9b71dce2d7b58c357d8f54ff497eb148c6bbc31ad7b0e13e4ed4d
SHA512d02a4559d637a367a9fd1adb964977e8fd7ef2064235fd026c1a6c8231813096f1f4907e1046bffae1be7a5f662114d0272ad194c6f76db471adcd8c486ef4fe
-
Filesize
7KB
MD5c73ce9237ea8bdee32f9174496cdcbb0
SHA10eee0b40dea781b6506c4cd9881fc7f1997e1efa
SHA256051bf8781fa9b71dce2d7b58c357d8f54ff497eb148c6bbc31ad7b0e13e4ed4d
SHA512d02a4559d637a367a9fd1adb964977e8fd7ef2064235fd026c1a6c8231813096f1f4907e1046bffae1be7a5f662114d0272ad194c6f76db471adcd8c486ef4fe
-
Filesize
12.1MB
MD56b6565acdfc8f94d04f221c07a6eca3d
SHA18a97f4017413c5c9b3ea764147d30584e8bf1836
SHA25601669a6e5d52977c627eb66aa56317c108fee956a875a88ed09f3dd96e7f20a9
SHA512ca67648b3ba5d02a9b8c91279704bf451221ddf0af46b5ed86084738fc07d0dc133a00a61f9851ea457b37ee13f40c4c06e2b136c176646431a910b93a969702
-
Filesize
12.1MB
MD56b6565acdfc8f94d04f221c07a6eca3d
SHA18a97f4017413c5c9b3ea764147d30584e8bf1836
SHA25601669a6e5d52977c627eb66aa56317c108fee956a875a88ed09f3dd96e7f20a9
SHA512ca67648b3ba5d02a9b8c91279704bf451221ddf0af46b5ed86084738fc07d0dc133a00a61f9851ea457b37ee13f40c4c06e2b136c176646431a910b93a969702
-
Filesize
1.4MB
MD53412592c23a9bc93a234c5e25130a71a
SHA1cad0b43ff636a6d6dbbfbd38e134aa0acda7b052
SHA256017ab0c10991b0d3faa2b6fdc43487632418c4f5a337e94f8490233d254ba566
SHA5122076c9ebf616986a5e7a309bc105639abaf1ece7fcc69585457026371353aca82377f70f2903340ed28f40b69f9314c925f2319431d05b0ea527ab4ce0bd75a3
-
Filesize
1.4MB
MD53412592c23a9bc93a234c5e25130a71a
SHA1cad0b43ff636a6d6dbbfbd38e134aa0acda7b052
SHA256017ab0c10991b0d3faa2b6fdc43487632418c4f5a337e94f8490233d254ba566
SHA5122076c9ebf616986a5e7a309bc105639abaf1ece7fcc69585457026371353aca82377f70f2903340ed28f40b69f9314c925f2319431d05b0ea527ab4ce0bd75a3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e