Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2022 13:24
Static task
static1
Behavioral task
behavioral1
Sample
SCANS_EE5164.html
Resource
win7-20221111-en
General
-
Target
SCANS_EE5164.html
-
Size
1.5MB
-
MD5
6d9354a5ce7ae0a22599f56309eea47f
-
SHA1
f7bf653fe03810ddc89fe9842acf6e459ff28950
-
SHA256
ffa93d9fbfdc46b9ffcad627b918ad86a3bbced0796e09e627f8c8b619875643
-
SHA512
5d1ed95cb64d4156eff0edd2186b3fac1fcae52f4be7ff1b21fc5227e5f5bd7753cb3a5d7424144b9cef606597ee198f7a544003e276fb3a7b295dec54b3b20b
-
SSDEEP
24576:5cEyMGTCmlO13OxIZGrntxnDrB3GdSNn9IkCTdZQO3sferBmT:eB8eDnt5p19IksHQVfeG
Malware Config
Extracted
qakbot
404.46
azd
1670585125
172.90.139.138:2222
90.116.219.167:2222
173.239.94.212:443
91.169.12.198:32100
74.66.134.24:443
66.191.69.18:995
182.75.189.42:995
78.69.251.252:2222
98.145.23.67:443
103.71.21.107:443
197.94.219.133:443
91.68.227.219:443
12.172.173.82:993
86.176.83.127:2222
64.121.161.102:443
41.98.21.114:443
92.154.17.149:2222
151.65.67.211:443
89.129.109.27:2222
76.11.14.249:443
69.119.123.159:2222
70.66.199.12:443
12.172.173.82:990
183.82.100.110:2222
83.114.60.6:2222
92.189.214.236:2222
70.115.104.126:995
190.18.236.175:443
121.122.99.223:995
72.53.103.56:443
91.165.188.74:50000
12.172.173.82:995
156.220.229.249:993
86.96.75.237:2222
85.152.152.46:443
181.118.183.44:443
76.80.180.154:995
81.248.77.37:2222
90.66.229.185:2222
86.130.9.250:2222
172.117.139.142:995
12.172.173.82:465
75.143.236.149:443
81.229.117.95:2222
81.111.108.123:443
50.68.204.71:995
124.122.55.68:443
139.5.239.14:443
37.56.111.49:995
46.10.198.106:443
85.61.165.153:2222
90.104.22.28:2222
88.126.94.4:50000
90.89.95.158:2222
83.213.201.104:993
73.223.248.31:443
47.41.154.250:443
2.99.47.198:2222
190.199.169.127:993
83.92.85.93:443
184.68.116.146:2222
73.161.176.218:443
150.107.231.59:2222
98.178.242.28:443
213.67.255.57:2222
174.104.184.149:443
108.6.249.139:443
84.35.26.14:995
149.126.159.106:443
184.68.116.146:3389
37.14.229.220:2222
24.206.27.39:443
199.83.165.233:443
84.215.202.22:443
71.247.10.63:995
50.68.204.71:443
86.169.19.140:2222
76.20.42.45:443
70.55.120.16:2222
69.133.162.35:443
12.172.173.82:21
72.200.109.104:443
50.68.204.71:993
2.83.12.243:443
184.176.154.83:995
176.177.136.35:443
92.207.132.174:2222
174.77.209.5:443
142.161.27.232:2222
86.159.48.25:2222
100.6.8.7:443
184.153.132.82:443
27.109.19.90:2078
94.105.123.53:443
198.2.51.242:993
70.120.228.205:443
75.158.15.211:443
181.164.194.223:443
184.68.116.146:61202
184.68.116.146:2078
86.225.214.138:2222
78.213.14.206:443
176.142.207.63:443
73.36.196.11:443
197.26.142.159:443
176.151.15.101:443
87.65.160.87:995
92.24.200.226:995
87.221.197.110:2222
77.86.98.236:443
162.248.14.107:443
84.113.121.103:443
137.186.193.226:3389
92.8.190.211:2222
201.208.139.250:2222
12.172.173.82:22
75.98.154.19:443
24.142.218.202:443
70.77.116.233:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\E: cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000003 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\HardwareID chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Service chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exerundll32.exewermgr.exepid process 4800 chrome.exe 4800 chrome.exe 3448 chrome.exe 3448 chrome.exe 4596 chrome.exe 4596 chrome.exe 944 chrome.exe 944 chrome.exe 3516 chrome.exe 3516 chrome.exe 3256 chrome.exe 3256 chrome.exe 3992 chrome.exe 3992 chrome.exe 3216 chrome.exe 3216 chrome.exe 3864 chrome.exe 3864 chrome.exe 536 rundll32.exe 536 rundll32.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe 4392 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 536 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3448 wrote to memory of 968 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 968 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4264 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4800 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4800 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe PID 3448 wrote to memory of 4420 3448 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Users\Admin\AppData\Local\Temp\SCANS_EE5164.html1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99e1d4f50,0x7ff99e1d4f60,0x7ff99e1d4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2328 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2980 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3392 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5484 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5516 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5056 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5600 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3784 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3824 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2540 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1270309650173879414,13991991443117004825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Pays\PayInfo.cmd A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 91⤵
- Enumerates connected drives
-
C:\Windows\system32\rundll32.exerundll32 /s newinvoice.new,DrawThemeIcon2⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 /s newinvoice.new,DrawThemeIcon3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\crashpad_3448_SICCPXYXPKCCCOUKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/536-134-0x0000000000000000-mapping.dmp
-
memory/536-135-0x00000000027A0000-0x00000000028CF000-memory.dmpFilesize
1.2MB
-
memory/536-136-0x0000000004340000-0x000000000436A000-memory.dmpFilesize
168KB
-
memory/536-137-0x00000000042B0000-0x0000000004307000-memory.dmpFilesize
348KB
-
memory/536-138-0x0000000004340000-0x000000000436A000-memory.dmpFilesize
168KB
-
memory/536-141-0x0000000004340000-0x000000000436A000-memory.dmpFilesize
168KB
-
memory/3992-133-0x0000000000000000-mapping.dmp
-
memory/4392-139-0x0000000000000000-mapping.dmp
-
memory/4392-140-0x0000000000530000-0x000000000055A000-memory.dmpFilesize
168KB
-
memory/4392-142-0x0000000000530000-0x000000000055A000-memory.dmpFilesize
168KB