Overview
overview
10Static
static
5f21561d-c...7b.zip
windows7-x64
15f21561d-c...7b.zip
windows10-1703-x64
15f21561d-c...7b.zip
windows10-2004-x64
1SCAN_DT6281.html
windows7-x64
8SCAN_DT6281.html
windows10-1703-x64
10SCAN_DT6281.html
windows10-2004-x64
8SCAN_DT6281.iso
windows7-x64
3SCAN_DT6281.iso
windows10-1703-x64
6SCAN_DT6281.iso
windows10-2004-x64
6IncomingPa...es.cmd
windows7-x64
10IncomingPa...es.cmd
windows10-1703-x64
10IncomingPa...es.cmd
windows10-2004-x64
10IncomingPa...on.dll
windows7-x64
10IncomingPa...on.dll
windows10-1703-x64
10IncomingPa...on.dll
windows10-2004-x64
10SCAN_DT6281.lnk
windows7-x64
10SCAN_DT6281.lnk
windows10-1703-x64
10SCAN_DT6281.lnk
windows10-2004-x64
10SCAN_DT628...es.cmd
windows7-x64
10SCAN_DT628...es.cmd
windows10-1703-x64
10SCAN_DT628...es.cmd
windows10-2004-x64
10SCAN_DT628...on.dll
windows7-x64
10SCAN_DT628...on.dll
windows10-1703-x64
10SCAN_DT628...on.dll
windows10-2004-x64
10SCAN_DT628...81.lnk
windows7-x64
10SCAN_DT628...81.lnk
windows10-1703-x64
10SCAN_DT628...81.lnk
windows10-2004-x64
10Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-01-2023 05:18
Static task
static1
Behavioral task
behavioral1
Sample
5f21561d-cd4e-4e55-8622-eeee37af1c7b.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5f21561d-cd4e-4e55-8622-eeee37af1c7b.zip
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
5f21561d-cd4e-4e55-8622-eeee37af1c7b.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral4
Sample
SCAN_DT6281.html
Resource
win7-20220812-en
Behavioral task
behavioral5
Sample
SCAN_DT6281.html
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
SCAN_DT6281.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
SCAN_DT6281.iso
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
SCAN_DT6281.iso
Resource
win10-20220901-en
Behavioral task
behavioral9
Sample
SCAN_DT6281.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
IncomingPay/Issues.cmd
Resource
win7-20221111-en
Behavioral task
behavioral11
Sample
IncomingPay/Issues.cmd
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
IncomingPay/Issues.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
IncomingPay/NewInformation.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
IncomingPay/NewInformation.dll
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
IncomingPay/NewInformation.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral16
Sample
SCAN_DT6281.lnk
Resource
win7-20220812-en
Behavioral task
behavioral17
Sample
SCAN_DT6281.lnk
Resource
win10-20220901-en
Behavioral task
behavioral18
Sample
SCAN_DT6281.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
SCAN_DT6281_img_contents/IncomingPay/Issues.cmd
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
SCAN_DT6281_img_contents/IncomingPay/Issues.cmd
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
SCAN_DT6281_img_contents/IncomingPay/Issues.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral22
Sample
SCAN_DT6281_img_contents/IncomingPay/NewInformation.dll
Resource
win7-20221111-en
Behavioral task
behavioral23
Sample
SCAN_DT6281_img_contents/IncomingPay/NewInformation.dll
Resource
win10-20220901-en
Behavioral task
behavioral24
Sample
SCAN_DT6281_img_contents/IncomingPay/NewInformation.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
SCAN_DT6281_img_contents/SCAN_DT6281.lnk
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
SCAN_DT6281_img_contents/SCAN_DT6281.lnk
Resource
win10-20220812-en
General
-
Target
SCAN_DT6281.html
-
Size
1.2MB
-
MD5
f0b615c8a648722fcdcc6a1f055c0bc0
-
SHA1
5e6a22b9044c9d684a3392391b23a762182ef5b3
-
SHA256
4efc4cc462a27245945ee90465caef589b71c41b33bf6d24ce2e6f74b75fdbe7
-
SHA512
9a5de209c7eaa3f0766fa0c4448302fd778401da9720347b5a4e5ae10eb6e6a065b7a86391c8dcac1d38f998ed4091b6a21fbcc3ad8f717e1e16737b757e2d75
-
SSDEEP
24576:dcEyMGTCmlO13OxIZGrntxnlvdcA09Xq3RzKJzIcZBENivdcAEYMfvG:qB8eDnt5Bx+AUBDxFMfO
Malware Config
Extracted
qakbot
404.30
azd
1670515354
136.35.241.159:443
73.36.196.11:443
12.172.173.82:50001
190.24.45.24:995
193.253.100.236:2222
109.11.175.42:2222
92.8.190.211:2222
50.90.249.161:443
66.180.226.117:2222
201.208.139.250:2222
12.172.173.82:22
75.98.154.19:443
24.142.218.202:443
70.77.116.233:443
90.4.193.117:2222
24.69.87.61:443
98.147.155.235:443
83.213.192.136:443
176.133.4.230:995
71.31.101.183:443
123.3.240.16:995
86.171.75.63:443
184.68.116.146:2222
24.71.120.191:443
91.171.148.162:50000
87.221.197.110:2222
172.90.139.138:2222
88.126.94.4:50000
66.85.236.205:2222
99.251.67.229:443
188.79.182.186:2222
73.155.10.79:443
31.53.29.245:2222
91.180.68.95:2222
70.121.198.103:2078
173.18.126.3:443
84.113.121.103:443
76.100.159.250:443
75.99.125.236:2222
98.145.23.67:443
213.67.255.57:2222
103.71.21.107:443
86.96.75.237:2222
90.79.129.166:2222
197.94.213.23:443
91.68.227.219:443
12.172.173.82:993
87.223.91.46:443
93.156.98.63:443
173.239.94.212:443
91.169.12.198:32100
38.166.226.185:2087
74.66.134.24:443
66.191.69.18:995
73.29.92.128:443
78.69.251.252:2222
94.30.98.134:32100
70.115.104.126:995
121.122.99.223:995
12.172.173.82:995
92.27.86.48:2222
80.13.179.151:2222
109.145.40.125:443
72.200.109.104:443
27.109.19.90:2078
178.191.21.187:995
85.7.61.22:2222
70.51.153.251:2222
184.68.116.146:50010
100.8.168.108:443
69.119.123.159:2222
70.66.199.12:443
208.180.17.32:2222
109.76.25.214:443
64.121.161.102:443
185.135.120.81:443
41.228.226.109:995
12.172.173.82:990
90.66.229.185:2222
12.172.173.82:465
75.143.236.149:443
81.229.117.95:2222
217.128.91.196:2222
172.117.139.142:995
2.99.47.198:2222
86.165.15.180:2222
91.165.188.74:50000
98.187.21.2:443
87.202.101.164:50000
76.80.180.154:995
201.137.151.25:443
99.229.164.42:443
86.190.16.164:443
81.248.77.37:2222
184.189.41.80:443
188.48.123.229:995
46.10.198.106:443
90.104.22.28:2222
86.130.9.250:2222
47.41.154.250:443
50.68.204.71:995
92.154.17.149:2222
47.34.30.133:443
92.189.214.236:2222
141.255.65.113:995
98.178.242.28:443
174.104.184.149:443
108.6.249.139:443
84.35.26.14:995
184.68.116.146:3389
90.221.1.60:443
24.206.27.39:443
85.61.165.153:2222
199.83.165.233:443
50.68.204.71:443
71.247.10.63:995
67.61.71.201:443
82.9.210.36:443
47.16.76.35:2222
193.32.212.114:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ChromeRecovery.exepid process 2016 ChromeRecovery.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.execmd.exedescription ioc process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe -
Drops file in Program Files directory 7 IoCs
Processes:
elevation_service.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\ChromeRecovery.exe elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\manifest.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\manifest.json elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\_metadata\verified_contents.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\_metadata\verified_contents.json elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\ChromeRecoveryCRX.crx elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\ChromeRecovery.exe elevation_service.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\en-US svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Service chrome.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ = "0" svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\en-US svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000003\Mfg svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exeregsvr32.exewermgr.exepid process 2020 chrome.exe 2020 chrome.exe 1968 chrome.exe 1968 chrome.exe 2328 chrome.exe 2328 chrome.exe 3188 chrome.exe 3188 chrome.exe 4964 chrome.exe 4964 chrome.exe 4776 chrome.exe 4776 chrome.exe 4812 chrome.exe 4812 chrome.exe 1180 chrome.exe 1180 chrome.exe 1248 chrome.exe 1248 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 4104 regsvr32.exe 4104 regsvr32.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe 4504 wermgr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 4104 regsvr32.exe 3584 regsvr32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zG.exedescription pid process Token: SeRestorePrivilege 3328 7zG.exe Token: 35 3328 7zG.exe Token: SeSecurityPrivilege 3328 7zG.exe Token: SeSecurityPrivilege 3328 7zG.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exe7zG.exepid process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 3328 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe 1968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1968 wrote to memory of 5044 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 5044 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 3996 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 2020 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 2020 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe PID 1968 wrote to memory of 1932 1968 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Users\Admin\AppData\Local\Temp\SCAN_DT6281.html1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff805b74f50,0x7ff805b74f60,0x7ff805b74f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1544 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2496 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2372 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2364 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4012 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5064 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5136 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4048 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2344 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=856 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1440 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1460 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2356 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1504,8108028002430162699,186039270662874671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 /prefetch:82⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap10930:134:7zEvent247591⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c IncomingPay\Issues.cmd A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 91⤵
- Enumerates connected drives
-
C:\Windows\system32\regsvr32.exeregsvr32 /s newinformation.lc2⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s newinformation.lc3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c IncomingPay\Issues.cmd A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 91⤵
- Enumerates connected drives
-
C:\Windows\system32\regsvr32.exeregsvr32 /s newinformation.lc2⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s newinformation.lc3⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={e431893b-cf2a-4a22-8c36-6c668da6e40f} --system2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1356_1114813822\ChromeRecovery.exeFilesize
253KB
MD549ac3c96d270702a27b4895e4ce1f42a
SHA155b90405f1e1b72143c64113e8bc65608dd3fd76
SHA25682aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f
SHA512b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3Filesize
141KB
MD5ea1c1ffd3ea54d1fb117bfdbb3569c60
SHA110958b0f690ae8f5240e1528b1ccffff28a33272
SHA2567c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d
SHA5126c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf
-
C:\Users\Admin\Downloads\e713ccbf-27d7-4158-992b-ea7de26afb53.zipFilesize
360KB
MD55ea038c683c17c1e8bd13732ea38d81e
SHA10e652105549adf2897d598fbca64dd01b74d17e1
SHA256b393d0b041aeb2299936d2362b67e324e7a8c6765a5bfacdabff3c4820c841c7
SHA5121eca1d4d7abf1d0e4b8542e95ca80cd7a634400f920ef7fb3c0b74fd0a2d7fdfd732c2f90962798536f9f36ec819578e7949efcda03b2b7e1f8a7fabb54ddec5
-
\??\pipe\crashpad_1968_DYGSQYKXJZTMPXHVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1228-325-0x00000000010F0000-0x000000000111A000-memory.dmpFilesize
168KB
-
memory/1228-283-0x0000000000000000-mapping.dmp
-
memory/2016-329-0x0000000000000000-mapping.dmp
-
memory/3584-231-0x0000000000000000-mapping.dmp
-
memory/3584-281-0x0000000002CF0000-0x0000000002E3A000-memory.dmpFilesize
1.3MB
-
memory/3584-282-0x0000000002CF0000-0x0000000002E3A000-memory.dmpFilesize
1.3MB
-
memory/4032-118-0x0000000000000000-mapping.dmp
-
memory/4104-153-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-159-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-126-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-127-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-129-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-130-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-131-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-128-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-132-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-133-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-134-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-135-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-136-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-137-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-138-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-139-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-140-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-141-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-142-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-144-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-143-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-145-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-146-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-147-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-148-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-149-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-150-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-151-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-152-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-124-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-154-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-155-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-156-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-157-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-158-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-125-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-160-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-161-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-162-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-163-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-164-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-165-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-166-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-167-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-168-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-169-0x00000000001B0000-0x00000000002FA000-memory.dmpFilesize
1.3MB
-
memory/4104-170-0x00000000001B0000-0x00000000002FA000-memory.dmpFilesize
1.3MB
-
memory/4104-119-0x0000000000000000-mapping.dmp
-
memory/4104-120-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-121-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-122-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4104-123-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4392-230-0x0000000000000000-mapping.dmp
-
memory/4504-183-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-178-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-174-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-173-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-180-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-181-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-182-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-175-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-229-0x0000000000DD0000-0x0000000000DFA000-memory.dmpFilesize
168KB
-
memory/4504-177-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-179-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-172-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-171-0x0000000000000000-mapping.dmp
-
memory/4504-176-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-186-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-184-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB
-
memory/4504-215-0x0000000000DD0000-0x0000000000DFA000-memory.dmpFilesize
168KB
-
memory/4504-185-0x0000000077290000-0x000000007741E000-memory.dmpFilesize
1.6MB