Analysis
-
max time kernel
1796s -
max time network
1803s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2023, 15:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s6.dosya.tc/server12/8c8mm7/Yeni_Metin_Belgesi.txt.html
Resource
win10v2004-20230220-en
General
-
Target
https://s6.dosya.tc/server12/8c8mm7/Yeni_Metin_Belgesi.txt.html
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\F: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\X: mstsc.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133229379922665432" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4992 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4108 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 912 chrome.exe 912 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4108 mstsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeCreatePagefilePrivilege 912 chrome.exe Token: 33 3424 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3424 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe 912 chrome.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4108 mstsc.exe 4776 CredentialUIBroker.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe 4108 mstsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 2288 912 chrome.exe 85 PID 912 wrote to memory of 2288 912 chrome.exe 85 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 4596 912 chrome.exe 86 PID 912 wrote to memory of 2144 912 chrome.exe 87 PID 912 wrote to memory of 2144 912 chrome.exe 87 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88 PID 912 wrote to memory of 984 912 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://s6.dosya.tc/server12/8c8mm7/Yeni_Metin_Belgesi.txt.html1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffca3619758,0x7ffca3619768,0x7ffca36197782⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:22⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5024 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4952 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6088 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=6184 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=6028 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:82⤵PID:4108
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Yeni_Metin_Belgesi.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6404 --field-trial-handle=1840,i,2291619603589332617,1276952795940495945,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4344
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4108
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2300
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x378 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:3424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD51a1275f6ab01977a94c2556583129a00
SHA1661838630ae8ce0385b2ac94b7d5793b203778e0
SHA256800c6021e3299869ed93d7f846d06608eb79d8bb576c2abeb3d4a8cb569ef2e7
SHA5123a4ae0971f141bf853539fec2d726e4659b8fed733ab660dd2409d0ec8343858c127db437019578334280482f0fa5bd161209722c1e126de1c7b9e659c9f40d1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5d27e6dd28c2e19f17386fa78637c668d
SHA1a97d8f832eadf346c4fcbb9a06029f0cb8fc156e
SHA256d0da76782a9249956657e2e279015da80a3df2b9eb112e252c8ea1fab79e72a0
SHA512fabe4682dba48c94e14cd1803eb069140230d05271a2f784936b354f2dda8ba6c33358fdbe78432677e557e97eee9383cb189e6c5af45599af98305f09484c26
-
Filesize
1KB
MD5774bd1c9cdf6cdd03fabfeae7449e473
SHA13c0f6c41ad9560d920c9c7730cfe5a0bf51d6d5f
SHA256b896f15e31397fdc7eecf1090ec6c07bbc197df43abf72211dbf7b8b26767370
SHA51225df09f8d962c23b5c6b682c5931fb899eacd13aff29e90bb5c0cb4755b33b0ca9dbe7facbd25c1c2b2274899e56bcc09c28bf7b424d5548d65de2074618ae6c
-
Filesize
1KB
MD55efeefa12491d59463810e253ea7afdf
SHA1d4eae7d84345e4bd847998618bbc402db2bc8372
SHA25612f149f4895a2347618c92ce828679c0c2b0a5220cfc151f26e6591913eb8de1
SHA512ce661d140aff87d0787a77d4970245d0090df92a64dc5b485d7d0607afcedfdce5f0944fba4a21530a4f244ba0e4ae47403c4de60ea68a9acdf29337f9a53bc2
-
Filesize
1KB
MD59fee31f1d8a1c974d82e76ca37819114
SHA1de07da4b9b796cf34ef5a2dab92d1b73db6eb883
SHA2560ee858b1ab685bb561308d26046b41f30af078bcad7dabdeb32a2dfca958d27e
SHA512362a895c1c82750504221531e724c2a767bb651f94cb96d40371e7ba8bfe7c2c9a455c33be30a5f6eddb1c64fb73710451a89f4ad7d4bb4ff01f3a39767b2074
-
Filesize
6KB
MD506d980a3d46104151222fb2cfe5223fa
SHA10fe32b73345107a57a89106744be7dd363b82d4c
SHA256bbed644db9b37fb92ec87949dd0d65bdb7b0d5800a458e14bbb228b9f0e17f0c
SHA512ff41ab2c17f0a5a3a9144cb9d7e13b3df57929c78c4923b36e57219c5fb75033fe432623ad1825e7f9b82aac8a50b6d44653953fd820467c40275f3e28a8f258
-
Filesize
7KB
MD5906188811f8f9c7414e38ad5d48c0c8e
SHA15862e0122098bd6d00674814f4a39a247f90f2f4
SHA256abfbafca895ceb7dee412997ba75457e5fc9a6681c51074ae48d9a87048886e7
SHA5123af8a6ad7a8c0fc4557ffde286f5c4ff0944e5d570784025fe04da3b1e38d1dad0c115a47594ae3c65c5406fce355998a4ed92eff93c942c7a6b712d639f5014
-
Filesize
15KB
MD534b4f81e142e7a416ec40aa4df027854
SHA1002bb88e3c37d91d754c3ea1abf2cedb1e3e0a6c
SHA25662c5b56dba2314808d6bc68952f40c5f2d05bf336971262496daa3ad45d8b02a
SHA512cfea6b0ac7740d403bacc043adb07a87ff7ce5aa29bda40e3ba575e10073e0d1e6fcdbd10eb11a752770c2672f20dd75767c8a9ed8fb487dc001ac8df57d2389
-
Filesize
145KB
MD50ad09f06dd957648097f86ca6b3d57c2
SHA17c1a99adfa08ba505c210af35a66d72873fa3526
SHA2567de35c4bb88124b43ee2e3c2b7e5d51a55724b6a86ff4f421aac0c9bbd216767
SHA51252d9d750ca38c3fe2e49b56bea1db4a1e4db4711f34fad09dde6f1dc8a60a8b1f73562d7a8fbaa7cb8c53dde21388441cd5a936c30b0c925722542aca803143c
-
Filesize
145KB
MD53bd0d27f879531b027eef7efc5f40abc
SHA11a56a6084f63d853a73d280a58bff317fac83c84
SHA2564d8db639ddd15f43f0078fe8d20a4a5624dcbce3a095c405d96421b164bd9f6c
SHA5123ab814beddfe5c20cfd123d9f24169133a9cdb387f94e0292e8889667b0606142f3b7ea844d66617584fb7cfc81550783d77c74adedb85212d8336184cd057b6
-
Filesize
72KB
MD51b8c8f5bf5c2f543eb718235c0bd293d
SHA174f64c9378f8f668dd0d29f49ded0731ec531f59
SHA256f28e36e968b50866d90f8570dbf334c606006530fc00aa62ae5c25be394eb55d
SHA512dab0de8c5bd7cbec038daa9282a06cc7cec0f9911a836211435430c4e05c6f546ab982be85a8e6e9b9c9e0fc8672f3ac497c0ef0f44d3d821501f2d8f4660ab0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
55B
MD530e8bb2d1319df7f97c6a359a81d5a6c
SHA1ed8ff2f85c3fa78e0f68ad0becdf32712c62cc49
SHA256da44da566b4f7bd00f5682f7d11f1a91c7f684a3267b33070f87cc41bec96611
SHA512a73a3b0d7cd5f6a28fcc3c167412aa127bc40393ba01592d660f20da4593c3de63b86b520511217585bca457fc4d7767c51f3b41dae75eb03ba00f6cd7e5c786
-
Filesize
55B
MD530e8bb2d1319df7f97c6a359a81d5a6c
SHA1ed8ff2f85c3fa78e0f68ad0becdf32712c62cc49
SHA256da44da566b4f7bd00f5682f7d11f1a91c7f684a3267b33070f87cc41bec96611
SHA512a73a3b0d7cd5f6a28fcc3c167412aa127bc40393ba01592d660f20da4593c3de63b86b520511217585bca457fc4d7767c51f3b41dae75eb03ba00f6cd7e5c786