Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
Nitro_Generator_exe.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Nitro_Generator_exe.html
Resource
win10v2004-20220812-en
General
-
Target
Nitro_Generator_exe.html
-
Size
12KB
-
MD5
7a19e75014636c2b550aed9430da22f9
-
SHA1
f10532ce1ab7d9feb5686ba33eb36cdd74693633
-
SHA256
523980aa1d0e5938b51a6e69929b83aa909e52ef5ae354bd32ccad56b0c04678
-
SHA512
53921e36537bf0e4ec98da5477bd55cac15d5e9951c9f76b9806974cd691cfa45ca44673cbb7c7ca71a1e9a641cca99e98a6010dd1849afc4d7712cc92b12205
-
SSDEEP
192:/zIaAp3vp9Esc2qEsIupQZwEmP6BL+eLZG7YEfbp0UcDiJyv:cas3vp9U2qjQZwEfBL+eLZG7DbKft
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1260 Process not Found 1260 Process not Found -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = c06a333b4a19d901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0de3e464a19d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b27373997a9e945aac1f50b65730bc900000000020000000000106600000001000020000000da50ad0341e36c7a125485f7dd3dc3f8650088e624abb2c4f3cd4f77a5c3b0d0000000000e80000000020000200000009ba07089991077f5acd50212099864308f486b388b777c6928c42cac675dbfe4200000004f366222b2d95710846fe2089c0fc978b8b9e661c9057c1fa3775af1aa8a1c0740000000af3b56a91e4db6c0838c93ad05ccc0a628244b4d998f7d7ba968b81ae399994b50a41d283b660bdb81d7ae7425aba47ca4a194d26b3fa0d440ff120725dfa50a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378838417" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E36FC71-853D-11ED-A23F-FE41811C61F5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 636 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2332 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2332 AUDIODG.EXE Token: 33 2332 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2332 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 1308 iexplore.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1308 iexplore.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1308 iexplore.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe 1188 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1308 iexplore.exe 1308 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1652 1308 iexplore.exe 28 PID 1308 wrote to memory of 1652 1308 iexplore.exe 28 PID 1308 wrote to memory of 1652 1308 iexplore.exe 28 PID 1308 wrote to memory of 1652 1308 iexplore.exe 28 PID 1188 wrote to memory of 912 1188 chrome.exe 30 PID 1188 wrote to memory of 912 1188 chrome.exe 30 PID 1188 wrote to memory of 912 1188 chrome.exe 30 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 1848 1188 chrome.exe 31 PID 1188 wrote to memory of 636 1188 chrome.exe 32 PID 1188 wrote to memory of 636 1188 chrome.exe 32 PID 1188 wrote to memory of 636 1188 chrome.exe 32 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33 PID 1188 wrote to memory of 1036 1188 chrome.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Nitro_Generator_exe.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6af4f50,0x7fef6af4f60,0x7fef6af4f702⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1120 /prefetch:22⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1664 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3316 /prefetch:22⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3552 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3636 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3696 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3480 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3936 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3960 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=928 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2352 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2136 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4400 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=536 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,14054097502784168095,7158441604602622334,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1716 /prefetch:82⤵PID:2644
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3044
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fab50026289e399029ae11986808d64
SHA10ad9b3feff7d71fcb724c283f17847f6f2b6d821
SHA256af837829a27259cd1e9bafeac9df47b0a4119a90b33a92a90d6d4aa5e37422d9
SHA51298544336e37b0690d3e923c6fd70988397fa1408f5ad35a661553eff6188aefd6052e1e5458beeade88d5bc666dda9a8f4a12b756eadd866a7270739b7848e05
-
Filesize
606B
MD586903f85bc9ccad4b45e78a850df2048
SHA1dc1430ab8c3c7a7a69786837fb4f08773e038230
SHA2569a25ee29498c4633add5929cd50d87e69d3fbcc4ead1d497108ee7183db17d35
SHA5124796ff1940615adec7c5a188fece5a48f7f50adb7c77e8edb0c1e35cec8cfa4a30f2177ebac890c0ddd81898994e3f39b785ac4a28e546305eab1b9478d8f78d
-
Filesize
34.0MB
MD50dba5c8a099bf7e533680e23397e6c2f
SHA1e4047481676a362ed0a56486c9d3aadd15ea14fa
SHA256be5b8969718ec4b1e7c588a5589b660af6832019f9daf910a8de5d11772e816a
SHA512e6a14ee769ef8d4301af624bbbe4b1c6b52bf161caded7ff146ccb7116ab0133d85bc6567242e063f1b3a9c717b690e78f25fb9cdf7bfa07c1a7041645c8b619
-
Filesize
18KB
MD51b71fad0f5130ea9920c56fda0707bba
SHA10666ce166d20951b8194170b56502dae9f5a68f5
SHA2568a2dc31c91f8d1216aee2117250c4662370b719c27cc1720836742f7cc612618
SHA51214697099982672f66b777e4c98d834c9e9289544b9d56ef8a42dffa6e31062eb85ed90d5e0440fd1972965d51c0a633d6979d59e3319429b7dddc69c00e7d584
-
Filesize
34.0MB
MD50dba5c8a099bf7e533680e23397e6c2f
SHA1e4047481676a362ed0a56486c9d3aadd15ea14fa
SHA256be5b8969718ec4b1e7c588a5589b660af6832019f9daf910a8de5d11772e816a
SHA512e6a14ee769ef8d4301af624bbbe4b1c6b52bf161caded7ff146ccb7116ab0133d85bc6567242e063f1b3a9c717b690e78f25fb9cdf7bfa07c1a7041645c8b619
-
Filesize
34.0MB
MD50dba5c8a099bf7e533680e23397e6c2f
SHA1e4047481676a362ed0a56486c9d3aadd15ea14fa
SHA256be5b8969718ec4b1e7c588a5589b660af6832019f9daf910a8de5d11772e816a
SHA512e6a14ee769ef8d4301af624bbbe4b1c6b52bf161caded7ff146ccb7116ab0133d85bc6567242e063f1b3a9c717b690e78f25fb9cdf7bfa07c1a7041645c8b619