Resubmissions

03/02/2023, 15:51

230203-taw9labe31 7

03/02/2023, 15:47

230203-s8p3habe21 7

03/02/2023, 15:44

230203-s6jgyafh93 8

03/02/2023, 15:40

230203-s4h4dsfh85 8

Analysis

  • max time kernel
    145s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    03/02/2023, 15:44

General

  • Target

    SKlauncher 3.0.exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:928
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b34f50,0x7fef6b34f60,0x7fef6b34f70
      2⤵
        PID:964
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1044 /prefetch:2
        2⤵
          PID:660
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1344 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1568
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1712 /prefetch:8
          2⤵
            PID:1376
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2156 /prefetch:1
            2⤵
              PID:1608
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:1
              2⤵
                PID:1884
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
                2⤵
                  PID:2224
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3324 /prefetch:2
                  2⤵
                    PID:2404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                    2⤵
                      PID:2448
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3520 /prefetch:8
                      2⤵
                        PID:2512
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3644 /prefetch:8
                        2⤵
                          PID:2520
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3612 /prefetch:8
                          2⤵
                            PID:2584
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:8
                            2⤵
                              PID:2592
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3628 /prefetch:8
                              2⤵
                                PID:2600
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3728 /prefetch:8
                                2⤵
                                  PID:2608
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3428 /prefetch:8
                                  2⤵
                                    PID:2616
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:1
                                    2⤵
                                      PID:2764
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2160 /prefetch:1
                                      2⤵
                                        PID:2824
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                                        2⤵
                                          PID:2892
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:1
                                          2⤵
                                            PID:2900
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:1
                                            2⤵
                                              PID:3048
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:1
                                              2⤵
                                                PID:320
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:1
                                                2⤵
                                                  PID:676
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4832 /prefetch:8
                                                  2⤵
                                                    PID:2236
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4888 /prefetch:8
                                                    2⤵
                                                      PID:2256
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2328
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4876 /prefetch:8
                                                      2⤵
                                                      • Loads dropped DLL
                                                      PID:2396
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4836 /prefetch:8
                                                      2⤵
                                                      • Loads dropped DLL
                                                      PID:660
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                                                      2⤵
                                                        PID:2628
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:1
                                                        2⤵
                                                          PID:2632
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                                                          2⤵
                                                            PID:2612
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5048 /prefetch:8
                                                            2⤵
                                                              PID:2092
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4620 /prefetch:8
                                                              2⤵
                                                                PID:1644
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2164
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4572 /prefetch:8
                                                                2⤵
                                                                • Loads dropped DLL
                                                                PID:2816
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5232 /prefetch:8
                                                                2⤵
                                                                • Loads dropped DLL
                                                                PID:2808
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=780 /prefetch:8
                                                                2⤵
                                                                  PID:2848
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:1
                                                                  2⤵
                                                                    PID:2964
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5220 /prefetch:8
                                                                    2⤵
                                                                      PID:524
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4928 /prefetch:8
                                                                      2⤵
                                                                        PID:1604
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2480 /prefetch:8
                                                                        2⤵
                                                                          PID:2312
                                                                        • C:\Users\Admin\Downloads\jre-8u361-windows-x64.exe
                                                                          "C:\Users\Admin\Downloads\jre-8u361-windows-x64.exe"
                                                                          2⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          PID:2284
                                                                          • C:\Users\Admin\AppData\Local\Temp\jds7193143.tmp\jre-8u361-windows-x64.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\jds7193143.tmp\jre-8u361-windows-x64.exe"
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Modifies Internet Explorer settings
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1596
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:8
                                                                          2⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:564
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4404 /prefetch:8
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          PID:2340
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,7539503170643578748,16670043142479082030,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4388 /prefetch:8
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          PID:2388
                                                                      • C:\Windows\explorer.exe
                                                                        "C:\Windows\explorer.exe"
                                                                        1⤵
                                                                          PID:2652

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v6

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          d020846329394c3436d13cfbc2fc9d83

                                                                          SHA1

                                                                          abda4d85e78ea27b5c27d5cf67c8a3a7e9686566

                                                                          SHA256

                                                                          f490bbf02f64b76835d486e9114f46b45391ecc975ec694129eae82aac31c43c

                                                                          SHA512

                                                                          0d684b555bbbbcd982643ae5b67a4d50da548effad907014e643ae30cf56a10239ff304dfad86bf2c28ea7f737aaa4703907c293b73aac13f838db5affdf8b28

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                          Filesize

                                                                          61KB

                                                                          MD5

                                                                          fc4666cbca561e864e7fdf883a9e6661

                                                                          SHA1

                                                                          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                                                          SHA256

                                                                          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                                                          SHA512

                                                                          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                                                          Filesize

                                                                          724B

                                                                          MD5

                                                                          f569e1d183b84e8078dc456192127536

                                                                          SHA1

                                                                          30c537463eed902925300dd07a87d820a713753f

                                                                          SHA256

                                                                          287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

                                                                          SHA512

                                                                          49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                          Filesize

                                                                          410B

                                                                          MD5

                                                                          0c7701a6e757a36b3c5e3ff1ab6480f4

                                                                          SHA1

                                                                          a1d8bd172aa599ec5566c00c926a8f1ad52755a0

                                                                          SHA256

                                                                          0f1942f987ba57a32ad5fef6fed599befd1abb5422564c19b2fbc6b33b5fa926

                                                                          SHA512

                                                                          3b0eae410e4ff11ac52f0a9d96839ae67bdce684a380e61181d7b3025fbe2c7d1b5f22d433b6462d37de8f7fc39bf5abe138dfd58723692b1e2a8872e68b05a3

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                          Filesize

                                                                          342B

                                                                          MD5

                                                                          7adf36453515242fddb4ffb8b82f9d2a

                                                                          SHA1

                                                                          20040f01797f648766f60ad8c2c9f40af2a352b0

                                                                          SHA256

                                                                          3a861b2a2eb961bb46d4f6f1d0439f78bb91f6a325b533f9a31b887f774d4be1

                                                                          SHA512

                                                                          bb260ccde4d2a6f95b1d3a856b5e8198686580593c47684a693e65e9ebb1667b7271244c2b8839ecc0e25af2a16c3ffe6f1e9fb66e5e33faf97943432e739296

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                          Filesize

                                                                          342B

                                                                          MD5

                                                                          e1b6eec95e95c4eb4bb213248e631b4e

                                                                          SHA1

                                                                          fed97e988eb029b6b6510d7ef9e19ad7a985babc

                                                                          SHA256

                                                                          111166e1269fd86d786738278b335472e67678bbe174c3b08a3db9e325e7f839

                                                                          SHA512

                                                                          dec54c5f9a9fdf1dc68175e832c5efb2126d96d1580965f546d0a899cae141169dda0ba264fbe1bab6a24751d914da3be04ebe980876216ddb813bc888b34b1b

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                                                                          Filesize

                                                                          392B

                                                                          MD5

                                                                          c5bc415bec87504ac99109e00ec941ec

                                                                          SHA1

                                                                          08b4e17c8b4ff11be078a2bf466dd384e3abc41f

                                                                          SHA256

                                                                          f668cb535dee9825b7a6837ca1c046af4ac7b8eb3309839f46a38e7d5748b232

                                                                          SHA512

                                                                          3d099a5ff9a26981ed34792a822adb837e0e3f001a08ab00d3b40171305db66d6f930b2db97e40b6b9397900de302e24fa6f14f9f2e29e446de4d5c9d5a8ea51

                                                                        • C:\Users\Admin\AppData\Local\Temp\jds7193143.tmp\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          61.7MB

                                                                          MD5

                                                                          e920cf3e63612868ed4b6cd9612bae77

                                                                          SHA1

                                                                          ef64fb46f8e955430d6fbd3778ff03e4c1f0e1b0

                                                                          SHA256

                                                                          a45104f8bf9a356b538f74aec9c7d25b92bef2d8e97cc27ed6d7232294a8ed82

                                                                          SHA512

                                                                          b02af44d9a87e06b0309e842d550b54b92575ba36a3ea74184bba40d4665751d91c8547ddd9c1c009d413f56829f7fcc604592ba51118c916cd1e039930571b2

                                                                        • C:\Users\Admin\AppData\Local\Temp\jusched.log

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          a47a493df2dab440e3775337cd3a1183

                                                                          SHA1

                                                                          3bb43d002a0da2ae3a4a53c7f2666539da2f89ec

                                                                          SHA256

                                                                          9428d958b4b9cb8e8602fe36ee7ca1c08e30d64e64f214e8f7670bc20014f0a3

                                                                          SHA512

                                                                          7d9301d3d957cf44517e5e9bd9cd6a7219b40d674f62bc1827734a58247f7ccc1459dc2c24a31d21af83a9cfd1288658b58737012026e1bd856569d9b3d1d479

                                                                        • C:\Users\Admin\Downloads\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\AppData\Local\Temp\jds7193143.tmp\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          61.7MB

                                                                          MD5

                                                                          e920cf3e63612868ed4b6cd9612bae77

                                                                          SHA1

                                                                          ef64fb46f8e955430d6fbd3778ff03e4c1f0e1b0

                                                                          SHA256

                                                                          a45104f8bf9a356b538f74aec9c7d25b92bef2d8e97cc27ed6d7232294a8ed82

                                                                          SHA512

                                                                          b02af44d9a87e06b0309e842d550b54b92575ba36a3ea74184bba40d4665751d91c8547ddd9c1c009d413f56829f7fcc604592ba51118c916cd1e039930571b2

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64 (1).exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64 (1).exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64 (1).exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64 (1).exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64 (2).exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64 (2).exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • \Users\Admin\Downloads\jre-8u361-windows-x64.exe

                                                                          Filesize

                                                                          62.1MB

                                                                          MD5

                                                                          e70de386ebc763932a181fc37a2ad042

                                                                          SHA1

                                                                          18e76e452b289ae2fc167667b55a81b11ec2693f

                                                                          SHA256

                                                                          419328f3a2325b1dc27f710abd73e232e9deac47915b4dba61a697b925b5b83d

                                                                          SHA512

                                                                          a45cb9c665a867042d0d52f085d095ac774c3f9b10febd858b26d2c899f7c2b5024586156ec572be384b226a8efc44d6757bbbc920843ce58119345bea155a0d

                                                                        • memory/1312-54-0x00000000761B1000-0x00000000761B3000-memory.dmp

                                                                          Filesize

                                                                          8KB

                                                                        • memory/1596-77-0x000007FEFBC51000-0x000007FEFBC53000-memory.dmp

                                                                          Filesize

                                                                          8KB