Resubmissions

31/01/2023, 01:42

230131-b4t28aec29 8

31/01/2023, 01:31

230131-bxq2zseb26 1

Analysis

  • max time kernel
    268s
  • max time network
    273s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2023, 01:42

General

  • Target

    http://secure.simplepractice.com/mixpanel_events?device_type=ios&email_type=client_portal_invite&name=client%3A+client+app+download+link+accessed&redirect_url=http://am0bsy.yenideninsana.com/[email protected]

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://secure.simplepractice.com/mixpanel_events?device_type=ios&email_type=client_portal_invite&name=client%3A+client+app+download+link+accessed&redirect_url=http://am0bsy.yenideninsana.com/[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1112
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd76da4f50,0x7ffd76da4f60,0x7ffd76da4f70
      2⤵
        PID:2544
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1628 /prefetch:2
        2⤵
          PID:4088
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1984 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4232
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2284 /prefetch:8
          2⤵
            PID:1752
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:1
            2⤵
              PID:5072
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:1
              2⤵
                PID:1188
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:1
                2⤵
                  PID:924
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:8
                  2⤵
                    PID:428
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4624 /prefetch:8
                    2⤵
                      PID:4944
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4748 /prefetch:8
                      2⤵
                        PID:1952
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3572
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1644
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:8
                        2⤵
                          PID:2572
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3668 /prefetch:8
                          2⤵
                            PID:3132
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:1
                            2⤵
                              PID:3524
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                              2⤵
                                PID:4372
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                                2⤵
                                  PID:3716
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:1
                                  2⤵
                                    PID:3140
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:1
                                    2⤵
                                      PID:3496
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:1
                                      2⤵
                                        PID:2572
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2268
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3196
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                                        2⤵
                                          PID:872
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:1
                                          2⤵
                                            PID:2224
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
                                            2⤵
                                              PID:4444
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5048 /prefetch:8
                                              2⤵
                                                PID:2296
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4988 /prefetch:8
                                                2⤵
                                                  PID:5052
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5532 /prefetch:8
                                                  2⤵
                                                    PID:2004
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5708 /prefetch:8
                                                    2⤵
                                                      PID:5100
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3204 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1116
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1952
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:1
                                                      2⤵
                                                        PID:2612
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                                                        2⤵
                                                          PID:1208
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:1
                                                          2⤵
                                                            PID:3908
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5636 /prefetch:8
                                                            2⤵
                                                              PID:4844
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                                              2⤵
                                                                PID:1852
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:1
                                                                2⤵
                                                                  PID:4060
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:8
                                                                  2⤵
                                                                    PID:1272
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5872 /prefetch:8
                                                                    2⤵
                                                                      PID:1260
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3808 /prefetch:2
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:2240
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1224 /prefetch:8
                                                                      2⤵
                                                                        PID:4416
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2832 /prefetch:8
                                                                        2⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1800
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,15623367580355054043,17076225396715649692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:8
                                                                        2⤵
                                                                          PID:796
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:3132
                                                                        • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                                          "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                                          1⤵
                                                                          • Drops file in Program Files directory
                                                                          PID:2904
                                                                          • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2904_1844527570\ChromeRecovery.exe
                                                                            "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2904_1844527570\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={6a60bee5-d5d6-4fa1-b538-b505e167b0e4} --system
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            PID:2152

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v6

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2904_1844527570\ChromeRecovery.exe

                                                                          Filesize

                                                                          253KB

                                                                          MD5

                                                                          49ac3c96d270702a27b4895e4ce1f42a

                                                                          SHA1

                                                                          55b90405f1e1b72143c64113e8bc65608dd3fd76

                                                                          SHA256

                                                                          82aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f

                                                                          SHA512

                                                                          b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                          Filesize

                                                                          717B

                                                                          MD5

                                                                          ec8ff3b1ded0246437b1472c69dd1811

                                                                          SHA1

                                                                          d813e874c2524e3a7da6c466c67854ad16800326

                                                                          SHA256

                                                                          e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

                                                                          SHA512

                                                                          e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

                                                                          Filesize

                                                                          779B

                                                                          MD5

                                                                          da6a32b46f7dd93455271b8ba5f6958c

                                                                          SHA1

                                                                          60113cc5a648a5659e5fe044e7224eee3ad6afe7

                                                                          SHA256

                                                                          5599ce82fbe165aca36b5135ad490b16c8891017caefc874f93146b9170cfdcc

                                                                          SHA512

                                                                          6d31ada0e633658e6c13379dca3e15a04794e6522d66309db852cedccf69b9857549d6424c625640b35daf2309ee07acacdc28c4a8f5d4e3d46092d91fd36db9

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          39a5c6c8de1709a8702fec31961dc62e

                                                                          SHA1

                                                                          1a4e641c008a027b1e34d9cd727c22476b16a3ea

                                                                          SHA256

                                                                          ea83c965f02da4f4095a581dcbbf1b1f810c73cdbacda1f373aa88017cd7bd6b

                                                                          SHA512

                                                                          9893e3ba64084fb1afeb77eac83b30bb7aa70b4f5ac559c1d4fcb57040faffa7e5fe7cd1f9cd9b56355bb887250d260a48bc8f7bc192ecbcc580d0d57e93d824

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_65F331229D99AFD1ADF04F03FC45C8B5

                                                                          Filesize

                                                                          471B

                                                                          MD5

                                                                          1fb331ecf6526385f6ed8f886be9a416

                                                                          SHA1

                                                                          45490004f58130d5382ca4f644b58d54069eca49

                                                                          SHA256

                                                                          8ff384a85e85697a281c6236fded59142892aba20d59f6ce6e0e2153ab5615ff

                                                                          SHA512

                                                                          fd829da0f5f14bac3a2eebb4f8c780f99da71d16c7cd7f11e2bb36f7f1a0c6a913dd6de494e67feb23e32109aefa638a97bf292c91f5668b8be6ea67e535c8ed

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9D76C05348D03812A89FC5E05EDA3328

                                                                          Filesize

                                                                          503B

                                                                          MD5

                                                                          576a741dbc1b6f1f7e6ffd13be5bab40

                                                                          SHA1

                                                                          f833f14b945c3c6a688b4c960c56c30955b5daa8

                                                                          SHA256

                                                                          6e2e34a404626182546bf70d30d475aee057ed87cf97d102273203e5495dd355

                                                                          SHA512

                                                                          bda004cc1d290ff5265f3746cad0cb08ee4cb9f84871f9c1da0e129040d1930fd0d870a2bfe72f867b0b1f7ad1cf15eec2dfefeb0b158e55e8a826bc64b33bf2

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          e86a0d3e0c9c7ad89559f9ab38ae8763

                                                                          SHA1

                                                                          a808a08e54fec8bc1371bcad3256f7800f2d8e81

                                                                          SHA256

                                                                          7491e2d84af8acd1b7d1aedf8803725daf91445561542b25530d6020b41534e8

                                                                          SHA512

                                                                          ecf7aa224b404233069e0f41aa58b93ef1c79c5079cea5e35748927b659c230f630f0d7149e4365013c0e3392cdc5e6115d438dea78a4d216eb67ffd4915b889

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          e6b4c21ebc7f713361fb50ac9d658c90

                                                                          SHA1

                                                                          8645f8372ca6eabdca5bc51fd3415c3ff42fc0b0

                                                                          SHA256

                                                                          cf1c874016da16f33080979d6e26ead798a170f610dbce4323e8de3cfc250a33

                                                                          SHA512

                                                                          e16adc60adfd7d394eb9832201d31c9d80d5b8a98a475f94ce7afff3ab522b58cb468f348140226c05618fcfe62b10d755bed8e3d6ae0b080ec986537867b4be

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                          Filesize

                                                                          192B

                                                                          MD5

                                                                          d35e62235f522d763e74b3ceb29b35ce

                                                                          SHA1

                                                                          460140883808ece23ef34733fec835263d199e6b

                                                                          SHA256

                                                                          de616b2b41a9e2d9a5bbe677923506d07676fa68cbbecbd7f1485ddfc56a7b56

                                                                          SHA512

                                                                          8a1004c31e9cd7aae4e04a4cd0178e4cdfb8836b0624c372761f0c0ede4c73b1c7498f31de1a7c6f4be3fa14da83b208b493ac3e2204a83e931e1e24a01f8859

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

                                                                          Filesize

                                                                          246B

                                                                          MD5

                                                                          d7903ecf237c30e53067c675e3d90078

                                                                          SHA1

                                                                          99716fd62fb45fc13fa6f24f5bc67c16d2c4893f

                                                                          SHA256

                                                                          a0570dd2d91667e7e92fce33dafc62d18316a9621b61c344483595bc2d7ff9a4

                                                                          SHA512

                                                                          a52c63479b3fe5769384e86f46a58ff044bc4f5e873c144a83653ce46f5c36a2fdf78c6d1e66c76f80e05cd12ca4f4ca6705bf1f3b2fea91c6faf25802d8d38d

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F

                                                                          Filesize

                                                                          442B

                                                                          MD5

                                                                          f556be12d55377df086dd7d8c2db2c1e

                                                                          SHA1

                                                                          190f07251d33249b6f00e3e7d843e48c7f2b5f97

                                                                          SHA256

                                                                          252e18049a7f1a456b1a624506ed7f048717f616bab09691bc4e73b45d7ea713

                                                                          SHA512

                                                                          17898048a903a2bac6ddade56e4219a1726a6eef45c18dbec9d13a5b8f0cf8392920d9efde7a87068a692671a9473fc657ab96d6379fadffef557e878cc8152b

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_65F331229D99AFD1ADF04F03FC45C8B5

                                                                          Filesize

                                                                          448B

                                                                          MD5

                                                                          dc1d0c75f505547edb1a6b0e21ba6c15

                                                                          SHA1

                                                                          bf1200de0b15a54b928a6fe89317b5a2d966b8d2

                                                                          SHA256

                                                                          cea7a0d01ad7cb53c9c43422ae900aca5df5cd4c79a3631f3c42d40d87af43ca

                                                                          SHA512

                                                                          1da111580b0d15ce10199eb745864b9e897b7b65897886383dbc37b64bff56c371cbc1210ac45ac2e82f30b930e75b7c0de5fcf85cee479a0db91780b8ad7aef

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9D76C05348D03812A89FC5E05EDA3328

                                                                          Filesize

                                                                          552B

                                                                          MD5

                                                                          16b9b59eedffc7550940e6e499967352

                                                                          SHA1

                                                                          399fd8f14df97d3f01b21662aa2a49cc87967c82

                                                                          SHA256

                                                                          1f8d5386107c5eca8857fa3638f7ff4237996d13c08ab94f35dd3efc167ed388

                                                                          SHA512

                                                                          8013d3c35f46950e63681317a860ede2201880178fd008e8406776094f6dec225e2196ed9d26c11b62f211da5c9d3c47d1c699ec4854723cbbfd723a39391803

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                                                          Filesize

                                                                          458B

                                                                          MD5

                                                                          80f0c2ecd62a113e03e78a4b765f99b4

                                                                          SHA1

                                                                          dcdc85901a03e44df511d9e6e9dd08d5e55ec006

                                                                          SHA256

                                                                          8f3b9257b7c96b21718112d936c5b1860665288555acd338acf56229d03168ea

                                                                          SHA512

                                                                          fd9da17ccd8b3d9d7fa56be6fef520ef0539a312ee3b6c37e3baf639ec4fa4bd9ff66a58bd0cbc442c49a62497bd304e89377d1bdb5458215b087b961bb5e882

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

                                                                          Filesize

                                                                          432B

                                                                          MD5

                                                                          06dd1f1bb2193a487ba115b7d0d1c967

                                                                          SHA1

                                                                          d769597de75041792bb4cc345388495cf7abd12c

                                                                          SHA256

                                                                          3e6ebfc4c21aaf43374fe147fb4042c1685f5a73e82c1c03d503e5e5924f5993

                                                                          SHA512

                                                                          0a4b99b5a4313e54b3e999595684f4ff92b9f9580d139da251c94dbac6df25ed56c771ee0bb9c0097a2dc0d982722f8a74d9c6f0bcffc3e0a3d4c56372736dba

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3

                                                                          Filesize

                                                                          141KB

                                                                          MD5

                                                                          ea1c1ffd3ea54d1fb117bfdbb3569c60

                                                                          SHA1

                                                                          10958b0f690ae8f5240e1528b1ccffff28a33272

                                                                          SHA256

                                                                          7c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d

                                                                          SHA512

                                                                          6c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          f50861ed182bad234a47647f96f14814

                                                                          SHA1

                                                                          0d8f330c8c9f623c01e8892a12efd3118434bbf8

                                                                          SHA256

                                                                          405b157eb44580dd8a195b27d98234ecdccb2acbe89c69a7a67b2730966f5b9d

                                                                          SHA512

                                                                          7220f8639173cfc6c4c80a6e29721dd3e753f4728781d06b6af5d0411d59f65bcef5ebb30a80148f9c4440ef427186a1d131763fe8338d3e0b86e3962a5d3018