Resubmissions
22-11-2022 00:51
221122-a7gqmagg5y 821-11-2022 23:09
221121-25dpqsed6v 1021-11-2022 21:54
221121-1slddace2y 1021-11-2022 21:30
221121-1crkfsge79 1021-11-2022 20:42
221121-zg8h4afe23 1021-11-2022 19:29
221121-x7e85ahb6w 10Analysis
-
max time kernel
292s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 23:09
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
XMRig Miner payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RarSFX0\GoogleUpdate.exe xmrig C:\Users\Admin\AppData\Local\Temp\RarSFX0\GoogleUpdate.exe xmrig behavioral1/memory/4312-143-0x00007FF6760A0000-0x00007FF6767AA000-memory.dmp xmrig behavioral1/memory/4312-170-0x00007FF6760A0000-0x00007FF6767AA000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
4.exeGoogleUpdate.exepid process 1464 4.exe 4312 GoogleUpdate.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exe4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEEXCEL.EXEEXCEL.EXEEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 15 IoCs
Processes:
chrome.exeEXCEL.EXEEXCEL.EXEEXCEL.EXEEXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
chrome.exe4.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 4.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3520 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3196 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exeEXCEL.EXEEXCEL.EXEEXCEL.EXEpid process 1648 chrome.exe 1648 chrome.exe 4960 chrome.exe 4960 chrome.exe 4360 chrome.exe 4360 chrome.exe 4804 chrome.exe 4804 chrome.exe 1624 chrome.exe 1624 chrome.exe 1480 chrome.exe 1480 chrome.exe 3472 chrome.exe 3472 chrome.exe 5064 chrome.exe 5064 chrome.exe 928 chrome.exe 928 chrome.exe 928 chrome.exe 928 chrome.exe 4352 EXCEL.EXE 4352 EXCEL.EXE 4012 EXCEL.EXE 4012 EXCEL.EXE 3216 EXCEL.EXE 3216 EXCEL.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zG.exe7zG.exedescription pid process Token: SeRestorePrivilege 952 7zG.exe Token: 35 952 7zG.exe Token: SeSecurityPrivilege 952 7zG.exe Token: SeSecurityPrivilege 952 7zG.exe Token: SeRestorePrivilege 4912 7zG.exe Token: 35 4912 7zG.exe Token: SeSecurityPrivilege 4912 7zG.exe Token: SeSecurityPrivilege 4912 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
chrome.exepid process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
Processes:
EXCEL.EXEEXCEL.EXEEXCEL.EXEEXCEL.EXEpid process 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 4352 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 4012 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3216 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE 3196 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4960 wrote to memory of 4852 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 4852 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 996 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 1648 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 1648 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe PID 4960 wrote to memory of 3484 4960 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://45.95.169.45:23205/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9abf4f50,0x7ffe9abf4f60,0x7ffe9abf4f702⤵PID:4852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1644 /prefetch:22⤵PID:996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2288 /prefetch:82⤵PID:3484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2952 /prefetch:12⤵PID:2680
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2936 /prefetch:12⤵PID:644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:5108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2888
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:4520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:4600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:4036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:3408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:4480
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3756 /prefetch:82⤵PID:2776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1564 /prefetch:82⤵PID:4272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:3396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:3068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:4792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,3572517595029456547,5768411393444591159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1084 /prefetch:82⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3108
-
C:\Users\Admin\Downloads\4.exe"C:\Users\Admin\Downloads\4.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.vbs"2⤵
- Checks computer location settings
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat" "3⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\GoogleUpdate.exegoogleupdate4⤵
- Executes dropped EXE
PID:4312
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\1\" -spe -an -ai#7zMap21012:64:7zEvent91291⤵
- Suspicious use of AdjustPrivilegeToken
PID:952
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\1\1\" -spe -an -ai#7zMap20900:68:7zEvent141531⤵
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Downloads\1\1\accesskeys.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3196
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Downloads\1\1\account.account.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4352
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Downloads\1\1\res.users.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4012
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Downloads\1\1\vpn.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3216
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\1.aspx1⤵
- Opens file in notepad (likely ransom note)
PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD58547b9a5c63a368f42299481655b2edb
SHA141403b04b68e6d1a77141863fff52957f1a0b4f6
SHA256dfa88bfbdb56634f2d39b985689804955454a21ce1cbbb59a914546e433fd907
SHA512ba94c0e67251601d57409e59aa263d1fa1f5582cca870d3626f43b3cef5e5b255592a12712deb148db528ed0ecd3c643f1efddc1f5d4df995402e6575fdf2a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize446B
MD5806d8fd157e535758d8b0a90c53b2501
SHA17d3cbf245b84e1f7e87eb6278276d0ea502d1c65
SHA256101c67e0c7f35b076414851ed467bab194cd4aebe4ce4f405377f0c9326580c6
SHA51233ffb3578702e6abefd3be40bbd91ee90be58423749784f87792b757c93bb6b396438842dbc45eb29083fa6b1fc1f8621568f6d7dc3f57683f6154ce0ee0a3b3
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\A71BFEE0-8C38-4F3E-89C7-59428C0E8535
Filesize147KB
MD5175394a07612d79c45615e8f172fc72d
SHA1b77015e955b0827eecbf02865d028fc080974464
SHA256c390da597f5e31fec0a96dfe5a0193d4bf8c3b6a1db6dae051054029fdba0c6f
SHA512519fc00943ea2269c5692a688e8fb8230d1f960c26a474cdb87534af21aaa5ad01a8541b1259457b2b0a73e26dc81acd468c0b7825034c8a191fd91bce50385c
-
Filesize
324KB
MD509054487e8c69240c9416b375b2916a9
SHA1f00ff01ae8c39170c57f9b27cedea8ef75f455b3
SHA2562d895d38c2f9874b296b8d5d8eef1e3738230d416f4b10517099027c0fe9b876
SHA512971c817f16331dbf06bd908ae5440ee5bc55ddab549cee258b792170c1f2144d4cfcbd14cee31e3e2f9606d0e3e48f226564131023fc035ed67d4e1b171b97f2
-
Filesize
4KB
MD5f138a66469c10d5761c6cbb36f2163c3
SHA1eea136206474280549586923b7a4a3c6d5db1e25
SHA256c712d6c7a60f170a0c6c5ec768d962c58b1f59a2d417e98c7c528a037c427ab6
SHA5129d25f943b6137dd2981ee75d57baf3a9e0ee27eea2df19591d580f02ec8520d837b8e419a8b1eb7197614a3c6d8793c56ebc848c38295ada23c31273daa302d9
-
Filesize
48KB
MD5ea126073170b8146592a0e1fa96a23d8
SHA18d68d05363ff4b9c1934b20a0137feab66287798
SHA256191a2d9581b4e7ff60a60287a9feedc681d377eac8b1bbe31fd26fd566da7fe9
SHA512371090c6a56b9b516615e133c0d18878ed6eda83733e12a028515734f94aa894eae2b486beac5b4b43782d9b9b19aa9b7ef460cbdc330fca8a3d930c4d9990af
-
Filesize
398KB
MD5acb4c32003311ec418e0f3a47b4486eb
SHA19820835f60aa191bb0802c9b2333e82002fab2c3
SHA25678278fb0eba4c4ea1e485e8683a97f16375502f64114de1dde6c2b713f43ac12
SHA51251376b87711319056118cda588993ca1610edab0e763d486cb07ae2e1196e0e24581bab095f7691bf9f70db6d65e226fb8ec8754d06caff1dbc86e9374200267
-
Filesize
772KB
MD54b48e140a24157776070faa15a3cbe2a
SHA16431a2592bd9565d551fabc87849dddf25d38b3c
SHA2569f6b4314849fbecd3899321c54d633207385cefaa338a426f4ac74b9dfa6371d
SHA512ff6e4475080bd1f22df6b4a24ef8c50c0c047243800153884ae343aa8c658e6817108a33fba041ce691842217954e0ead51aea949f5ad88bcbf1bbd0d9400f7b
-
Filesize
3.9MB
MD50182fba95c284d668f29be9e1fb68a5c
SHA13191332553ab8b6baac8a1bb74783b27a583dcdc
SHA25670f93213ac2bb7e2720c851446096653162015ba69c4780625b40e9215abc752
SHA512be5e2105113109d385c44f18594d91cc144e7d51e6ff7a38471416d97598d91a9ad125e177b04cc4533c1bab3f01c397a3593ce271ac29190090f69b93c294b6
-
Filesize
3.9MB
MD50182fba95c284d668f29be9e1fb68a5c
SHA13191332553ab8b6baac8a1bb74783b27a583dcdc
SHA25670f93213ac2bb7e2720c851446096653162015ba69c4780625b40e9215abc752
SHA512be5e2105113109d385c44f18594d91cc144e7d51e6ff7a38471416d97598d91a9ad125e177b04cc4533c1bab3f01c397a3593ce271ac29190090f69b93c294b6
-
Filesize
143B
MD5ba3893cad10edcb4a0572156a83a9c4c
SHA18564d3d2c10f89893f233b7b14934e1ca95baf4f
SHA25694fab46d5bca4f4a74eb8686d21f49e34a05ec79ffeb14d57275434fab7e4bd9
SHA512abf280586542e79248e88c3cb776f049acd1a9334a9fa8c78debb218a80068a0629a8abf16b61a19e11c1b8f0d80e4429d8ea0061ef14eb5f34f5d82397b4f3c
-
Filesize
117B
MD58099c67a9631789db03e90d7b7bf0980
SHA14fbf9f44825a1184b24a0d957b20a850f3b07c42
SHA25688a4ed5c8caad58c8eda0d4ed6e36c98ce5b7545529da0cf41ffea4015b71206
SHA512c2ce0931eed4925e9b808250aa1335e234470571f4e2c95ffc16af972656fb0c3c8b383327d38ec7d1a5d6290e5c6800715b14c0cb93f8ec2092f8e9c3a26043
-
Filesize
19KB
MD5b15bbecbf07eaa4eec60ef089cb20b45
SHA1cfa77b72b8d6294df023d7730acf638c0f48874b
SHA25632ca3d24a585d37bd07b4c768496791108cc27d63f842eec59ca47af07eee1ad
SHA512cbab8a46e186da9559b8a3c934b63f2df46ca94bced06a35fa4668edc0000369ce2f114a6536f3d523183828c3471c783dd1dcfc44f83142375cda12999a23ba
-
Filesize
30KB
MD53e396c7ab882f005fe3aa9ee8a7a2144
SHA1f9785b684c60e7a66ad78236b3924755d9667423
SHA2563c527cc189ce7826aa7adabe4f94fb1ef1859e2704c28e1feb1febbc3aebe59c
SHA5126f228c983fd49f2d84ba8c20b2e82bd402e6f1cd7e5d655ac8faca1d3351270b1bb44fd4082c33a9339fdb36993d4ed33f9c4fe6f558ca65b458ae4aa5ab5099
-
Filesize
50KB
MD54f1eb701c763331eef80f92703c12f0f
SHA1c0239e794fb85c9f6ac9c6f29f7fcf5df19a2440
SHA2567c96e83a47a914673c96187ee57e23ece1526d5643b5bb25b1ad753e39102ab5
SHA51214c8706150bdf9c00f9ac36e4272e828c395bbad8e4701d97d259deff12c5c07d8527050131d883bb7ff4bd82cb586b1956da5fe2c1ed053d80fb11f1a85fad0
-
Filesize
96B
MD539339a8d508480964a9bd52d0379d350
SHA11c4cb0bcf610fc0f80156c87b4354d86c375bf77
SHA256458a2d8b4ab3e6a2f6d09c0a7377342d8125abef130e91664f5b20b5825c5ae7
SHA512ca102a48276e1fa4b6b1ef4f681c4f66253c6e7502a933328bfdbe57aff95262ba449c8d4ea26833fb49cc7f9f873eeeb9da7eacab814a5832458b3d80e88eed
-
Filesize
13KB
MD5af22b93620765e4fb1d2030eec1f21cf
SHA1c06a4718e2eaefac6407f5b12eb5aac4febe00b8
SHA25611a8321222d939e9cb1d6b8f450d8ab982036b198ecf9f1366f136b93267ad4d
SHA512f29a4d15d3e4497b896d9f18b71c949a16790d7fe4cdd53c347de911841b8bb286eca1c738b2002a05fc64026f0297701b80544bd5dfff79f4ed9ee4190044ad
-
Filesize
5KB
MD514ada103c1bab1634b39b1ffc7f46028
SHA14a8000dabd13feabf3d9d9472d72e8c8410ef169
SHA256cc1e06b058639f039ebbff9f9c0ec8c22e02b240441c1d9ee4d9ed59ea9115d7
SHA512acb676d3380880ad0ccdecbaa193845b57abea45bb0f15bc7e546a3a6bedf8608222970c34b6e544147a8a6aab5856b5a3e247b8565599663b60dda4690d2f75
-
Filesize
11KB
MD56ad760c8802fd5f85d0a136553fa15cb
SHA14c62492241fe8962030e42ed3eb1756a89ccb473
SHA2564e38189ea44113d9d3d3156a24539a2d24a580da2d545a1aca858caaeaa4deb5
SHA512ea6b9b9c0d822cf8b959c48fac2ab77d3ebc05cc8eb3a77ae78ff3efda8dd8233f9231bb7f8930e920134d8c6b19c633cad6412360cf98d1cbe5ad38da807a1e
-
Filesize
1.7MB
MD5526b2774906d5c51fc024908cdf3fe64
SHA16c77a42be72f1a79df15a0d57da148a8db131ad1
SHA25657916056834db3f8feba4ffb588f51eebccb4bec802c989d5df74957e5e19e01
SHA5127c894edc5754ad01ae73b92d4c5cbc4498e92fe26a5ec17f2c328524fc9dba12a6cd408735558b8286b2920a4fa83c9d7f07d281c0c928e1d5255afdd45e60b2
-
Filesize
1.7MB
MD5526b2774906d5c51fc024908cdf3fe64
SHA16c77a42be72f1a79df15a0d57da148a8db131ad1
SHA25657916056834db3f8feba4ffb588f51eebccb4bec802c989d5df74957e5e19e01
SHA5127c894edc5754ad01ae73b92d4c5cbc4498e92fe26a5ec17f2c328524fc9dba12a6cd408735558b8286b2920a4fa83c9d7f07d281c0c928e1d5255afdd45e60b2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e