Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 01:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://commondatastorage.googleapis.com/chromium-browser-continuous/index.html
Resource
win7-20230220-en
General
-
Target
http://commondatastorage.googleapis.com/chromium-browser-continuous/index.html
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = b0ce5e98665cd901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc0000000002000000000010660000000100002000000039e1a841d867ab8e50dc55119171b6c65dca74e35b6740dc52e2e1f4a254cadb000000000e8000000002000020000000b954529893d132e32d64cfcbb59b99b44744e91c2f21f361fc20e6e815109578200000008a166d160dbf3d60df725dfcf9df50a0dbb4edc3eb850d116c157c7578c52cd3400000005b12d244ac95a86497a81f060ba04dc677e0b4698396f0377003899ba13dd2766f2335e703c747a6c2f6fd4148a2f085d882cf4c1588244593197da2b67bd0a4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386217246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cb616f665cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{955F9FF1-C859-11ED-9CE1-7AA90D5E5B0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies registry class 52 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell\open\command chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe,0" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.xht\ = "ChromiumHTML" chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\ChromiumHTML\shell\open\command chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe\" -- \"%1\"" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\URL Protocol chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.xhtml chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell\open\ddeexec chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\DefaultIcon chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\ChromiumHTML\shell chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\ChromiumHTML\shell\open chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromiumHTML\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe,0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell\open chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell\open\ddeexec chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell\open\command chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\DefaultIcon chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe,0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell\open chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\DefaultIcon chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\ChromiumHTML chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromiumHTML\URL Protocol chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell\ = "open" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\URL Protocol chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell\open chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell\open\ddeexec\ chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.xhtml\ = "ChromiumHTML" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.shtml chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.html\ = "ChromiumHTML" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.htm\ = "ChromiumHTML" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell\open\ddeexec\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell\open\ddeexec\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell\open\ddeexec chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.xht chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.html chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromiumHTML\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe\" -- \"%1\"" chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\ChromiumHTML\DefaultIcon chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\shell\open\command chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\http\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe,0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell\ = "open" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromiumHTML\ = "Chromium HTML Document" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell\ = "open" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe\" -- \"%1\"" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\https\URL Protocol chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\ftp\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\chrome-win32\\chrome.exe\" -- \"%1\"" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.shtml\ = "ChromiumHTML" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.htm chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1060 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1060 AUDIODG.EXE Token: 33 1060 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1060 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 1820 chrome.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE 612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 612 2008 iexplore.exe 29 PID 2008 wrote to memory of 612 2008 iexplore.exe 29 PID 2008 wrote to memory of 612 2008 iexplore.exe 29 PID 2008 wrote to memory of 612 2008 iexplore.exe 29 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 2028 1820 chrome.exe 34 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 PID 1820 wrote to memory of 1708 1820 chrome.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://commondatastorage.googleapis.com/chromium-browser-continuous/index.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:612
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5741⤵
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
C:\Users\Admin\Desktop\chrome-win32\chrome.exe"C:\Users\Admin\Desktop\chrome-win32\chrome.exe"1⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\Desktop\chrome-win32\chrome.exe"C:\Users\Admin\Desktop\chrome-win32\chrome.exe" --type=renderer --lang=en-US --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Www_Prefix/WarmSocketImpact/last_accessed_socket/ --channel=1820.03FD09A0.1842355388 /prefetch:32⤵
- Checks processor information in registry
PID:2028
-
-
C:\Users\Admin\Desktop\chrome-win32\chrome.exe"C:\Users\Admin\Desktop\chrome-win32\chrome.exe" --type=utility --channel=1820.06B56700.2020304829 --lang=en-US --ignored=" --type=renderer " /prefetch:72⤵
- Checks processor information in registry
PID:1708
-
-
C:\Users\Admin\Desktop\chrome-win32\chrome.exe"C:\Users\Admin\Desktop\chrome-win32\chrome.exe" --type=utility --channel=1820.06B56B60.199129416 --lang=en-US --ignored=" --type=renderer " /prefetch:72⤵
- Checks processor information in registry
PID:768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d6127c0439455f233e70f7186896f0b4
SHA1afef663e4b6b69f2c845ca014ac5187b4680d91b
SHA256fc5eb064c3d6689ea82bc0ad305d9174a66deab149713e9a5cf15300fcba07f0
SHA512e4871c468416a5e203d4de027536d6cc60c395923715f7c258f0fb99ea8487f279b38077cf3b909b4ca4533f067f3a7cd2d339cad1417c20db19852e40754649
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5dd1ad59555f8b90d314b6f65724d9786
SHA14c1b810aa3c8b85443ecaac831cfd8b732717201
SHA256d5ed3df8934c3d8e890ff87d1128ca1af904aef00520e7c0eb4b122d1e819d35
SHA512dd5961d93d28bedcd6c6430fddc8178909d864e1f7803107a204d664a86132d11df3408e6f26954717b5c811414285d619652f872c2748c4e25ce8d2fec675ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4cd8dc271bed201904b7e6cd0142b4
SHA192a53242ad122a5d14111786ec02e8044c9aa415
SHA2567964e05496a4a4bad0128fbb65bb3e22c02f068613465a2a0358ccfb0aa972e9
SHA512a53d829e79eee5a461e16ce6c6a45864f6e79285d19070682cb16f30c7f375a1fe8bcf4d915c1535add5d54f62e723b64c2548764064827c44d8ada8cdcbb33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb36a36dea6f9e51ac87796a3971489
SHA176cb6a0c5858b62a72f3a0e5e87c6eae541916bd
SHA256f9a8369bd930372802aae6d4b4ca718a857588324178a065516d61ff864f12cb
SHA512533dfb94d7a85bd8c41bb38126eaff044db7538bb47f00251e1f9944ea8cce0ac40b0390a1d80fde2bdbc6864feb81733f7159d3fad2f899b60713534cc88140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec1b5b698c39a300d6a1ef91258c78f
SHA120d4762adce168f17bcdd4cbf5949998e329a90e
SHA256ee876f9d2c5942673c1b2b6ce6325c45b0fc321eb002cf2d93a5b5c3343690aa
SHA5127e99c71dcc20c121078e4786e84b9c3540e823d146053dc1d577406dd91a527e2721cc983e176cfd60aeafba53063dfc6cc362017afeef691edf7fdfc94b5a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df100ff3ea66d6046bb181049dcc1e63
SHA155c63049a7b82ab1762b1c2b0ab7b282d291ac9e
SHA2563f8e790a10f7e3d9065b9e887610ee57331e751cacd3347a3f5230b70683e282
SHA5120f53da8369eb615671cdde90ba3a0a66dbeb10e47801b551f42753faadfbc81fd322ca881f2ebc124b852121e5e0ccca37bd1ba87038218a9d3d8edbcb744e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59919b64b12eedca3a13c7a6703a501b2
SHA1614548e5a0b33372c3f7a3b36a03f5429ffd80f4
SHA256f1b0caedd3978c24bde9c646a782b73965927ad69fcb33a71f707ff6496b8442
SHA5123264b918ed7d320ac1a22ad17c61a2defbfa78a2342853e4ffa3df1e68513976454a60d07ad7e0ce6907e3f1c17010dbb350f185adbcee23e6af3316947dd3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e78c76d58a8ed6b09fdad80b8b5fda6
SHA1173fad95022c17e5ca1523d2b953825f00807076
SHA256b6711969a188242d06b7740e1949781f6bb02c5a03d0a579bdb123407c36213d
SHA5120f19ef049ed720886b3301c0271d5ef3f02787ead636ecb85ac9446cebc2e6920710b2226caaf4dd675f37e1ec8d9f99f600a620fe5bd94154f65c6f2be9099c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6a94afba2612511795149d273df11e
SHA15f7e7bac59daf799f60229606c947dacfc09723d
SHA256ffe20ff28460fc9c6dee04eb82429702fb9d15499441903c0eee56b221484120
SHA5124e9fe69077e92073b43a83142df732af430f3b604b22d849217d9a05e563ed568f4594f699e2a82459a5962665bc98300e9ba2b98c8a7778e6bea6428ec019b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbe2b43021f6bffeb4ce819c729dab0
SHA16566209a8123430678a8777094ddde630f61e756
SHA256c35df84897748fcde8f911f16bfec231b837363e9247a56647dbf6ea0840c29e
SHA51245e4510bb98aa01ecb74be026837cf63be5a180d04d1c4d5f8c5e67723ef13579cd2ac08fc08623a09d2482a82ce6a886b9095f12a05d08cc6fcc81054c0afc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD51250426c96568982b00a71371c6617b2
SHA10b71ec3acfe72153831a663f54ec4524d186d80c
SHA2564ca6e64dc9c14fea77959a38b5ec20e5b829ecaa161060d8988439d69804603f
SHA5127f6b59e860e9114181638fe1f941e88574c669bede7bf1c0d58ea7ec0085ee5b1bdc4917fc0e86d5e021578cfd6f05123274227e76a9e494ac140ebd8ab2d868
-
Filesize
5KB
MD548bc7c9c8472ef8d7e4da29f329568ba
SHA185e7f782c2f6be7aaa76e84d0cd97ca774b5c84b
SHA25663edd1894d2d5e1f7b3d64f0bd794384bb65b73648af9fc673d21b7a70ffecad
SHA51234c943b6e001bafd136fa955d1a89f189d74fef57cad76409c2d34cf2bd1b8af09f311ba89b66de72e975713a7cbefb336b3341abc9fd2782a16b3e0b0e0d712
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DE9Y0H7M\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\angular.min[1].js
Filesize96KB
MD51a6ea1e7aa5b1db4104b5b6741f1531e
SHA1132b8dfbdc9ef70a7d4d05a3e32fda91f38b0783
SHA2561e54aee38939e4dabd8cc4f547132d9b93dde306ed566a65a5b3f2e8debe609f
SHA512393cf03983be5971bfec23d656c0f6987c56b736c361e3c07eece4dbdf40c5ad86cf1dab8841271db717bfe9cc7e618cea461599a2211cba517c83afca3c933f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\bootstrap.min[1].css
Filesize106KB
MD5385b964b68acb68d23cb43a5218fade9
SHA158a360d7ef24d8d05737db1712dd5c086597e862
SHA256b5fd723750763ebb731f9221e413e7d64d58d5192dc040e42292ed3dcccca732
SHA512729f49483ca2d020c2bc17c52982d65debdbdebf2146fe49c5cc4b914abf2c4b4098e83b5f4cb3477a74c7f83e4b7696719c35f26871b025f27a5296997833ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\jquery-2.1.1.min[1].js
Filesize82KB
MD5e40ec2161fe7993196f23c8a07346306
SHA1afb90752e0a90c24b7f724faca86c5f3d15d1178
SHA256874706b2b1311a0719b5267f7d1cf803057e367e94ae1ff7bf78c5450d30f5d4
SHA5125f57cc757fff0e9990a72e78f6373f0a24bce2edf3c4559f0b6fef3cf65edf932c0f3eca5a35511ea11eabc0a412f1c7563282ec76f6fa005cc59504417159eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\ng-grid.min[1].css
Filesize6KB
MD5b5de952bc4e3681c53e1d0afc67bf834
SHA183f07c75f275ef6e3299ddf05af1a1a1769e5c62
SHA25625dea35046212075b53f28a07a84c45c9bb1e6f944a0efe093c72d7e852e40d5
SHA5126ba2ca54765cc508414fb9e5d7433ebaf2f56d94e10be4478a7cb1a26d945bde6772b052989b0c9f2fb0215d172216f649ce2efa86575602c2d668435e5efa7c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\ng-grid.min[1].js
Filesize60KB
MD5ddcee8ceaa22e6c0188bdb2afa7ac467
SHA10bf1a6a12068ba2293852f150813b55e5b884b1d
SHA256a40c1840e190a8d81d81a75b3e1fa695c62ef12c05e274f0f968a1fbadc78f0e
SHA512ef33f12cf078f144e11ddaa622b1d1df236557d0142278dc031ab8e21eae4500690eb2cd3994241ab1f02dc703a0845547d455bebcc916e3e331ada4c89fdfed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\Win_100137_chrome-win32.zip.rcvsko3.partial
Filesize30.5MB
MD5ce9f15f634f2c24e92809d08d41bef4a
SHA19afab9700ad4804ff9dc4afd27e71f9d30c9611a
SHA256d8fba81a63b6638fab495805552ace3a783bd8b0a2a308c593fad82cda3f0525
SHA51220f6ceb564d5052f6ae6bb3514d42ad9e79eeb03ad56d309536f047ab92e3ed615dc860cd2c9266461e7a2267b238ab3c4203c28a44070fca54db8539affde92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\cloud_storage-32[1].png
Filesize850B
MD5352549ece32e8183cb6792d5b1e7450b
SHA16c6ea952ec11c2026e828f0118bb9a58e35ccfbf
SHA25624283abecab24b0a7f50518ef5e9c684b1abd4fdbb31c6d0e1ca63a236a34d1c
SHA5125cc8c80095b2928eeaeaa987fee7769fc344a913f89d4505f38687d87916351dabea19883550ffe4b95b2e2802fee7297a9927c845f78dd5aa963bff06ae7eed
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5e0147f793c1c130104b4160f415832b5
SHA103ed165e70e07600d23d7fc818e530a1c2e8e658
SHA256a5959689932970ee9184bf9b9eaa2f3978d968ba92d338bc682f53db9b9562fa
SHA512b714914ef198c629b1263c67fb71e1f679086d5fe73a4e60fd7d3e35472ccf245307551520e9ff5fa4ed38e446d44ec32a56bdb2160c4613612c5cc2bdca5059