Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2023, 20:38

General

  • Target

    KiCDv1.8.1-www.juegospcfull.com.torrent

  • Size

    466KB

  • MD5

    24e1d940335c6bcd39e55a3c0c5fb2de

  • SHA1

    e7f41c4f8440b2ae21d36d30a54f22caa1a5b5cd

  • SHA256

    6f2208564e1589c773a7fdcbe3ce29306fdf1f44db27b0ca5908b884f9f305dc

  • SHA512

    5be01a9bd3a73ba651f0cf45a6f639a5bcc33de2d9791cb6b76b51fac7263521ac98d177e7cf1f90393deefd30e479727b082a37d93e1f1aca03c9d2c1980bfd

  • SSDEEP

    12288:pVN3QleJu4GFR3QogKwDkyHHoc18hC0f2JCBA2qCWm9Ias2fC9:h3QuMRQo8IcGQy8as2fC9

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 29 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 52 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\KiCDv1.8.1-www.juegospcfull.com.torrent
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KiCDv1.8.1-www.juegospcfull.com.torrent
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\KiCDv1.8.1-www.juegospcfull.com.torrent
        3⤵
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1836
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\KiCDv1.8.1-www.juegospcfull.com.torrent
          4⤵
            PID:1224
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\KiCDv1.8.1-www.juegospcfull.com.torrent
            4⤵
              PID:1876
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6184f50,0x7fef6184f60,0x7fef6184f70
          2⤵
            PID:608
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1048 /prefetch:2
            2⤵
              PID:1716
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1364 /prefetch:8
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1916
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1744 /prefetch:8
              2⤵
                PID:1740
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2124 /prefetch:1
                2⤵
                  PID:1108
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:1
                  2⤵
                    PID:1708
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:8
                    2⤵
                      PID:2176
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2520 /prefetch:2
                      2⤵
                        PID:2248
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                        2⤵
                          PID:2292
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3664 /prefetch:8
                          2⤵
                            PID:2364
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3784 /prefetch:8
                            2⤵
                              PID:2372
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3832 /prefetch:8
                              2⤵
                                PID:2440
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3648 /prefetch:8
                                2⤵
                                  PID:2448
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3672 /prefetch:8
                                  2⤵
                                    PID:2456
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3932 /prefetch:8
                                    2⤵
                                      PID:2548
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4020 /prefetch:8
                                      2⤵
                                        PID:2588
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3556 /prefetch:8
                                        2⤵
                                          PID:2596
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3740 /prefetch:8
                                          2⤵
                                            PID:2604
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3732 /prefetch:8
                                            2⤵
                                              PID:2612
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4228 /prefetch:8
                                              2⤵
                                                PID:2620
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4240 /prefetch:8
                                                2⤵
                                                  PID:2628
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3768 /prefetch:8
                                                  2⤵
                                                    PID:2812
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3976 /prefetch:8
                                                    2⤵
                                                      PID:2820
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3820 /prefetch:8
                                                      2⤵
                                                        PID:2828
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3888 /prefetch:8
                                                        2⤵
                                                          PID:2836
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:1
                                                          2⤵
                                                            PID:2956
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2132 /prefetch:1
                                                            2⤵
                                                              PID:3016
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1
                                                              2⤵
                                                                PID:2224
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:1
                                                                2⤵
                                                                  PID:1820
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4592 /prefetch:8
                                                                  2⤵
                                                                    PID:2492
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4648 /prefetch:8
                                                                    2⤵
                                                                      PID:2512
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1120 /prefetch:8
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:2580
                                                                    • C:\Users\Admin\Downloads\utweb_installer.exe
                                                                      "C:\Users\Admin\Downloads\utweb_installer.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:2616
                                                                      • C:\Users\Admin\AppData\Local\Temp\is-PNCHL.tmp\utweb_installer.tmp
                                                                        "C:\Users\Admin\AppData\Local\Temp\is-PNCHL.tmp\utweb_installer.tmp" /SL5="$801BA,897614,818688,C:\Users\Admin\Downloads\utweb_installer.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Checks processor information in registry
                                                                        • Modifies system certificate store
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        PID:2760
                                                                        • C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\utweb_installer.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\utweb_installer.exe" /S
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:2884
                                                                        • C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2988
                                                                        • C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe
                                                                          "C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe" /RUNONSTARTUP
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Adds Run key to start application
                                                                          • Modifies system certificate store
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3060
                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                            "C:\Program Files\Internet Explorer\iexplore.exe" https://utweb.rainberrytv.com/gui/index.html?v=1.3.0.5416&firstrun=1&localauth=localapicf7278bac6caf36c:
                                                                            5⤵
                                                                              PID:1788
                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                              "C:\Program Files\Internet Explorer\iexplore.exe" https://utweb.rainberrytv.com/gui/index.html?v=1.3.0.5416&localauth=localapicf7278bac6caf36c:
                                                                              5⤵
                                                                                PID:2904
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4704 /prefetch:8
                                                                          2⤵
                                                                            PID:2668
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1548 /prefetch:8
                                                                            2⤵
                                                                              PID:2608
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,16678629044643464820,17445746585223770697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=532 /prefetch:8
                                                                              2⤵
                                                                                PID:2584
                                                                            • C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe
                                                                              "C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              PID:2860

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v6

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                              Filesize

                                                                              61KB

                                                                              MD5

                                                                              fc4666cbca561e864e7fdf883a9e6661

                                                                              SHA1

                                                                              2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                                                              SHA256

                                                                              10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                                                              SHA512

                                                                              c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                              Filesize

                                                                              304B

                                                                              MD5

                                                                              03f7c9b4a151b31eaaa3d14645219555

                                                                              SHA1

                                                                              d938cfb426a0b8cb7a10d35ab9c1aaa163db7938

                                                                              SHA256

                                                                              bd740797d1cd19b679d5671e072774f1df7387fdaea58fe4854fae5a16a32317

                                                                              SHA512

                                                                              3fac4331124a0ee210d6cdb32d48576ee5078221b12fb9fd8047f72b1c2ef4ed2291a622ede9bd89fe60f540cc4ec98b3ca1406629674e4987d60707299b6b7c

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                              Filesize

                                                                              304B

                                                                              MD5

                                                                              fa8f8ea0c0e8048cc3f6ae722750fc52

                                                                              SHA1

                                                                              7947bc2973a0532f2418bb0209a778574cdb7b13

                                                                              SHA256

                                                                              feebba150c53726b91778dbbbf6e8578b4db5af0b1994451523b67694630d037

                                                                              SHA512

                                                                              00eab943156f0747273dc9a89085a5c7b19b2ed273fbcae557ae680025ee879ff8daf0673e105863f6e98ad7e130312744c76ea0a5a3ba278482041a00107591

                                                                            • C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                              SHA1

                                                                              6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                              SHA256

                                                                              60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                              SHA512

                                                                              cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                            • C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                              SHA1

                                                                              6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                              SHA256

                                                                              60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                              SHA512

                                                                              cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                            • C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\utweb_installer.exe

                                                                              Filesize

                                                                              17.1MB

                                                                              MD5

                                                                              4d6832e2703831d04862a872deed1498

                                                                              SHA1

                                                                              83df5407d2c806192eed520792c84941e7e39258

                                                                              SHA256

                                                                              d6f547e7270366df500323d93653a8c2d00a13484f6f5a8c73719ce2bb468a50

                                                                              SHA512

                                                                              dfec31f0e8b7df28b1b703a1ef748e146415cf0f1cf7459d6bc9c2c6d5fb0bc004cc1fafaa52e14b41ac455f3e930e3fb15da29b92ad825d85217137a68a2132

                                                                            • C:\Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\utweb_installer.exe

                                                                              Filesize

                                                                              17.1MB

                                                                              MD5

                                                                              4d6832e2703831d04862a872deed1498

                                                                              SHA1

                                                                              83df5407d2c806192eed520792c84941e7e39258

                                                                              SHA256

                                                                              d6f547e7270366df500323d93653a8c2d00a13484f6f5a8c73719ce2bb468a50

                                                                              SHA512

                                                                              dfec31f0e8b7df28b1b703a1ef748e146415cf0f1cf7459d6bc9c2c6d5fb0bc004cc1fafaa52e14b41ac455f3e930e3fb15da29b92ad825d85217137a68a2132

                                                                            • C:\Users\Admin\AppData\Local\Temp\is-PNCHL.tmp\utweb_installer.tmp

                                                                              Filesize

                                                                              3.0MB

                                                                              MD5

                                                                              67bf20135a695fabdaaaa3a5b5fab93c

                                                                              SHA1

                                                                              70f502b809e9a57227a2b53b3f69f125fa9aafc2

                                                                              SHA256

                                                                              dc65ab657292474f6331058d8ccc6f23920f39798a1a37135e80fcfe4a5b5b26

                                                                              SHA512

                                                                              c75a3a1aaf644fef8d38beb9e76335e399355b6192a1c153a1ce2657ced44774394ead06dba79df9b5d250f7324198ebc6128813fb1241132c0376aab6e6e27a

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\132Q3IHA.txt

                                                                              Filesize

                                                                              601B

                                                                              MD5

                                                                              515ec6741db8d9f4ab2605b5d3b11bba

                                                                              SHA1

                                                                              11b23c8d2931b883c4b057c732c469605db225d4

                                                                              SHA256

                                                                              9731b609d39441e41cf806eec7e1cd821b995b6ad25204651db8c8204a9ca993

                                                                              SHA512

                                                                              593f39c0040cd20ff43f5e3cbfe344642dc8cbbc3ffb98322f6bdb98063ecc5f1ce673688c7f037448922639ded6a637fea4832ac4cce095d2f230b67f3c4d99

                                                                            • C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe

                                                                              Filesize

                                                                              6.1MB

                                                                              MD5

                                                                              ed689538304a78428942fac35bb47db6

                                                                              SHA1

                                                                              24f5013d47f73f92e04fc4ce610ff92317380f63

                                                                              SHA256

                                                                              0cde4a5ac7745c124381a9bfd0a75221804a59f8c5a5a7ea2b468fdc5c5afcae

                                                                              SHA512

                                                                              ed8602d40d0e0807c7edca85718005b6ec8fd722fcd05fc996f43c336ae9d09f933fb0665212444348bc7ef2d17cd199000572c547102e05b118c5c9afa1c7e4

                                                                            • C:\Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe

                                                                              Filesize

                                                                              6.1MB

                                                                              MD5

                                                                              ed689538304a78428942fac35bb47db6

                                                                              SHA1

                                                                              24f5013d47f73f92e04fc4ce610ff92317380f63

                                                                              SHA256

                                                                              0cde4a5ac7745c124381a9bfd0a75221804a59f8c5a5a7ea2b468fdc5c5afcae

                                                                              SHA512

                                                                              ed8602d40d0e0807c7edca85718005b6ec8fd722fcd05fc996f43c336ae9d09f933fb0665212444348bc7ef2d17cd199000572c547102e05b118c5c9afa1c7e4

                                                                            • C:\Users\Admin\Downloads\utweb_installer.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              11a5830f7f4a1037d8230587944548f1

                                                                              SHA1

                                                                              334fe1859d430d72c0cc031b609aecd6ce89afac

                                                                              SHA256

                                                                              1bb2c481300addba00ec81dde4c27895677da7ec64dd5e84e0881c2344bfc442

                                                                              SHA512

                                                                              96d01cad05379c36114af7689d3b9b6ddf8cf4d2de61aad3bbede0723408a1e4ef9f3f22140e3ea1dd4ea08b0cb64da7af935880750e99dfff1bc731fde6b95f

                                                                            • C:\Users\Admin\Downloads\utweb_installer.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              11a5830f7f4a1037d8230587944548f1

                                                                              SHA1

                                                                              334fe1859d430d72c0cc031b609aecd6ce89afac

                                                                              SHA256

                                                                              1bb2c481300addba00ec81dde4c27895677da7ec64dd5e84e0881c2344bfc442

                                                                              SHA512

                                                                              96d01cad05379c36114af7689d3b9b6ddf8cf4d2de61aad3bbede0723408a1e4ef9f3f22140e3ea1dd4ea08b0cb64da7af935880750e99dfff1bc731fde6b95f

                                                                            • \Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\botva2.dll

                                                                              Filesize

                                                                              37KB

                                                                              MD5

                                                                              67965a5957a61867d661f05ae1f4773e

                                                                              SHA1

                                                                              f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                                                                              SHA256

                                                                              450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                                                                              SHA512

                                                                              c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                                                                            • \Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                              SHA1

                                                                              6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                              SHA256

                                                                              60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                              SHA512

                                                                              cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                            • \Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                              SHA1

                                                                              6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                              SHA256

                                                                              60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                              SHA512

                                                                              cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                            • \Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                              SHA1

                                                                              6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                              SHA256

                                                                              60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                              SHA512

                                                                              cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                            • \Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\prod0_extract\saBSI.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              2c5cc4fed6ef0d07e8a855ea52b7c108

                                                                              SHA1

                                                                              6db652c54c0e712f1db740fc8535791bf7845dcc

                                                                              SHA256

                                                                              60410875199ad0bf34cd8402e0cc9151caf919fe98eeffd7056285e7239a3474

                                                                              SHA512

                                                                              cd8622cc38270caaf90ba61058a80d5554700dcfbb05ee921dde9aba7a1d6a068f24e73535baf3bbf4d2cc63d84cfe362cfa67df201b401d52b5af490610b0cc

                                                                            • \Users\Admin\AppData\Local\Temp\is-KR1QG.tmp\utweb_installer.exe

                                                                              Filesize

                                                                              17.1MB

                                                                              MD5

                                                                              4d6832e2703831d04862a872deed1498

                                                                              SHA1

                                                                              83df5407d2c806192eed520792c84941e7e39258

                                                                              SHA256

                                                                              d6f547e7270366df500323d93653a8c2d00a13484f6f5a8c73719ce2bb468a50

                                                                              SHA512

                                                                              dfec31f0e8b7df28b1b703a1ef748e146415cf0f1cf7459d6bc9c2c6d5fb0bc004cc1fafaa52e14b41ac455f3e930e3fb15da29b92ad825d85217137a68a2132

                                                                            • \Users\Admin\AppData\Local\Temp\is-PNCHL.tmp\utweb_installer.tmp

                                                                              Filesize

                                                                              3.0MB

                                                                              MD5

                                                                              67bf20135a695fabdaaaa3a5b5fab93c

                                                                              SHA1

                                                                              70f502b809e9a57227a2b53b3f69f125fa9aafc2

                                                                              SHA256

                                                                              dc65ab657292474f6331058d8ccc6f23920f39798a1a37135e80fcfe4a5b5b26

                                                                              SHA512

                                                                              c75a3a1aaf644fef8d38beb9e76335e399355b6192a1c153a1ce2657ced44774394ead06dba79df9b5d250f7324198ebc6128813fb1241132c0376aab6e6e27a

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\FindProcDLL.dll

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              b4faf654de4284a89eaf7d073e4e1e63

                                                                              SHA1

                                                                              8efcfd1ca648e942cbffd27af429784b7fcf514b

                                                                              SHA256

                                                                              c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3

                                                                              SHA512

                                                                              eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\INetC.dll

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              640bff73a5f8e37b202d911e4749b2e9

                                                                              SHA1

                                                                              9588dd7561ab7de3bca392b084bec91f3521c879

                                                                              SHA256

                                                                              c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502

                                                                              SHA512

                                                                              39c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\INetC.dll

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              640bff73a5f8e37b202d911e4749b2e9

                                                                              SHA1

                                                                              9588dd7561ab7de3bca392b084bec91f3521c879

                                                                              SHA256

                                                                              c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502

                                                                              SHA512

                                                                              39c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\System.dll

                                                                              Filesize

                                                                              12KB

                                                                              MD5

                                                                              cff85c549d536f651d4fb8387f1976f2

                                                                              SHA1

                                                                              d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                                                              SHA256

                                                                              8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                                                              SHA512

                                                                              531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\System.dll

                                                                              Filesize

                                                                              12KB

                                                                              MD5

                                                                              cff85c549d536f651d4fb8387f1976f2

                                                                              SHA1

                                                                              d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                                                              SHA256

                                                                              8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                                                              SHA512

                                                                              531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\UAC.dll

                                                                              Filesize

                                                                              14KB

                                                                              MD5

                                                                              adb29e6b186daa765dc750128649b63d

                                                                              SHA1

                                                                              160cbdc4cb0ac2c142d361df138c537aa7e708c9

                                                                              SHA256

                                                                              2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

                                                                              SHA512

                                                                              b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

                                                                            • \Users\Admin\AppData\Local\Temp\nsz7B98.tmp\nsisFirewall.dll

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              f5bf81a102de52a4add21b8a367e54e0

                                                                              SHA1

                                                                              cf1e76ffe4a3ecd4dad453112afd33624f16751c

                                                                              SHA256

                                                                              53be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2

                                                                              SHA512

                                                                              6e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256

                                                                            • \Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe

                                                                              Filesize

                                                                              6.1MB

                                                                              MD5

                                                                              ed689538304a78428942fac35bb47db6

                                                                              SHA1

                                                                              24f5013d47f73f92e04fc4ce610ff92317380f63

                                                                              SHA256

                                                                              0cde4a5ac7745c124381a9bfd0a75221804a59f8c5a5a7ea2b468fdc5c5afcae

                                                                              SHA512

                                                                              ed8602d40d0e0807c7edca85718005b6ec8fd722fcd05fc996f43c336ae9d09f933fb0665212444348bc7ef2d17cd199000572c547102e05b118c5c9afa1c7e4

                                                                            • \Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe

                                                                              Filesize

                                                                              6.1MB

                                                                              MD5

                                                                              ed689538304a78428942fac35bb47db6

                                                                              SHA1

                                                                              24f5013d47f73f92e04fc4ce610ff92317380f63

                                                                              SHA256

                                                                              0cde4a5ac7745c124381a9bfd0a75221804a59f8c5a5a7ea2b468fdc5c5afcae

                                                                              SHA512

                                                                              ed8602d40d0e0807c7edca85718005b6ec8fd722fcd05fc996f43c336ae9d09f933fb0665212444348bc7ef2d17cd199000572c547102e05b118c5c9afa1c7e4

                                                                            • \Users\Admin\AppData\Roaming\uTorrent Web\utweb.exe

                                                                              Filesize

                                                                              6.1MB

                                                                              MD5

                                                                              ed689538304a78428942fac35bb47db6

                                                                              SHA1

                                                                              24f5013d47f73f92e04fc4ce610ff92317380f63

                                                                              SHA256

                                                                              0cde4a5ac7745c124381a9bfd0a75221804a59f8c5a5a7ea2b468fdc5c5afcae

                                                                              SHA512

                                                                              ed8602d40d0e0807c7edca85718005b6ec8fd722fcd05fc996f43c336ae9d09f933fb0665212444348bc7ef2d17cd199000572c547102e05b118c5c9afa1c7e4

                                                                            • memory/2004-54-0x000007FEFB941000-0x000007FEFB943000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2616-85-0x0000000000400000-0x00000000004D5000-memory.dmp

                                                                              Filesize

                                                                              852KB

                                                                            • memory/2616-84-0x00000000752B1000-0x00000000752B3000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2616-92-0x0000000000400000-0x00000000004D5000-memory.dmp

                                                                              Filesize

                                                                              852KB

                                                                            • memory/2616-127-0x0000000000400000-0x00000000004D5000-memory.dmp

                                                                              Filesize

                                                                              852KB

                                                                            • memory/2760-95-0x0000000071931000-0x0000000071933000-memory.dmp

                                                                              Filesize

                                                                              8KB