Analysis
-
max time kernel
398s -
max time network
407s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
27-03-2023 03:56
Static task
static1
Behavioral task
behavioral1
Sample
desktop.ini
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
desktop.ini
Resource
win10v2004-20230220-es
General
-
Target
desktop.ini
-
Size
282B
-
MD5
3a37312509712d4e12d27240137ff377
-
SHA1
30ced927e23b584725cf16351394175a6d2a9577
-
SHA256
b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3
-
SHA512
dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 2992 MEMZ.exe 1492 MEMZ.exe 3048 MEMZ.exe 3064 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 560 MEMZ.exe -
Loads dropped DLL 1 IoCs
Processes:
MEMZ.exepid process 2992 MEMZ.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1604 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 1492 MEMZ.exe 3048 MEMZ.exe 3064 MEMZ.exe 1048 MEMZ.exe 2084 MEMZ.exe 1492 MEMZ.exe 3048 MEMZ.exe 3064 MEMZ.exe 1048 MEMZ.exe 2084 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 1048 MEMZ.exe 2084 MEMZ.exe 1492 MEMZ.exe 3048 MEMZ.exe 3064 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 1492 MEMZ.exe 3048 MEMZ.exe 3064 MEMZ.exe 1048 MEMZ.exe 2084 MEMZ.exe 1492 MEMZ.exe 3048 MEMZ.exe 3064 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 1048 MEMZ.exe 2084 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe 1492 MEMZ.exe 3064 MEMZ.exe 3048 MEMZ.exe 2084 MEMZ.exe 1048 MEMZ.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
Processes:
chrome.exepid process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 860 wrote to memory of 796 860 chrome.exe chrome.exe PID 860 wrote to memory of 796 860 chrome.exe chrome.exe PID 860 wrote to memory of 796 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 772 860 chrome.exe chrome.exe PID 860 wrote to memory of 1032 860 chrome.exe chrome.exe PID 860 wrote to memory of 1032 860 chrome.exe chrome.exe PID 860 wrote to memory of 1032 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe PID 860 wrote to memory of 1748 860 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\desktop.ini1⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7019758,0x7fef7019768,0x7fef70197782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2328 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2344 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3704 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1440 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3912 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3932 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1648 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=584 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3604 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=776 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1880 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1128 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3648 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2188 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3848 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3560 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1876 --field-trial-handle=1316,i,12671941768617867071,18020387883285009222,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1dc1⤵
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /main2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
672B
MD5f74df4b33816246b8fb304bfa6e1e5e4
SHA140a6831676f83a0855ff1ee95d103af9801c3322
SHA2560cc5d370b801e9d19048d7df3f6dd9cac34252f90230068e32d7f8c413cdebde
SHA5122fe4cb62e0d67cfee6ab2dd5cb24beb5a247f07157282583673cfe89c6ee0f63fb4af7cacad99b44a0b20bd675ae0b81f2cb213ed931b1d20ef24b5481237948
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5fc505461825da5724a2cd314884e4330
SHA15a70f9015ae0160249f9af5055152b39dd6b0530
SHA256e7751f4634bd9e970b14f8a59559f469d994641bc09dce09bcff1bcfe2cf8fdd
SHA512104f9e7ad2d2b7b17b1b3c9529b5f9f3c52d924e84e556a47ab2ccebd67461bdb80716ea34320b78e647d1844b9efaad316ddcbc3a9fd198a3f1d84e784d9c5c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000002.dbtmpFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5a7dcb8b7f0b70194b585285aa3401a81
SHA1e212ba53dca254fc91b262963b5c9cef60b10d38
SHA256aa3c3ce3b04678995eedd9d4c693a501bae9a13d47506eca94f94725c11794b6
SHA512f28ab54e3977567ba19a3caddff73250c74464d05c7234c35a1257eeb25e5e29e29f592cea05002370cee688544be369b124d42266f2120f13a1e6fd7a22c162
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD510785a37c20be3c6786d66e101bb2dfe
SHA16294ce44fa740d478eb768ffa890c56b90f15ac0
SHA256183ce070dfb32438524001834100bdb3edece96aaec6e43e4a2de036a99e1d35
SHA512b7e91bc8772af587fbefaa86754bc2af3e264e033cf2d1fa9e8eadc5c809369aaec20effc88adac2dbec86034ddfda0de523e82541c66a77867842e96b3ec2fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
363B
MD5ab3b98c3a5e2789b76417d33aa70157d
SHA1a5ae264b8fb20cbfdd648d28fb3b6ebee913fb53
SHA2563033561043ef2e7155475c2c841b70e553d0631add2643c42973b913460e548a
SHA512391f0cc506073ce5dd606f3bf6e7781dcb0366ed3a81ff2efca76450a2e90484fd8639c71fb1d4432b425f1b95552efa3592e21c276796f9513d4d7d4b1dac41
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD59b8523ce518884f55fdc80ae4b447b8a
SHA1722ac1b7f5cf4ab30ba15a9e5f133af43f471f4e
SHA2563d7c02cf5d4643acb0e5bd54e3b417de1fc79b2fe6e34e0c97bfa3aee5b31820
SHA512d5c091f896370d68dc9225881719236ff9f78ca4804ad863e4a4fe71991fab3d015f1f168bae82efcc720ab5e2a7c6bc770d7c287e21820d02d5c7594d661792
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5d3c22f6f011a056a849ed2f57a0e9182
SHA15a3f3c1de0832fe8ae4ebc5d00ba7aa017f64e11
SHA256879c9c5ac802f811074537cdfd8265e9152abe6b36157d5c7ace451209627b80
SHA512597f398e9b5734f30e75b92eef8903093477c8c2fe151f6626317e83f2163805aa45da9c60a23bf5f46a80b564d52e80883493f01db26e67979fbf9312c61fd3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD59d38653c54dbbd4ca9cf70e8cd7b3257
SHA1d078537cfb653474caa02c7e54af2cae093a75ed
SHA256daa028d66b7d05dc590a2189d479503bd82cd34af6910f986a9e713c3a472f60
SHA512784489c073c54c00a781083fd2c5245cd5f932481592e7a39192c34b565dcb620cc2e382fb1d57b1283246c98546a2c053e11c67c74df38c6c919d56ff9f7dbf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5c87b8c59dca7981444ea52b5b3d67ffc
SHA1270210d9687583e4a7dc2607c914a8c17c8b4917
SHA2568567e52408cd04a39ff42339e4a2b2b32447a3594893e682ff55f38b7d98078d
SHA5127e3fd23a9915ae04838f1242c5a35632f2521d4f4a505d41489e6322703a8063ffb93743cd99a8e71fcbaaa2a82bdf119b6f25f81069d1d7fa2d0af809082930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD588f2d9aa8b9da0249d26a4f6e94d8f75
SHA1394f7360fe73e29fe942e7fd87e04811b07a16a2
SHA2563434d6bb3217721c1e73aa710146f0d2c6674ae6edd5eee0f608116f708d2922
SHA51268323101a284aaa7b0a1c2d334b59a6e2aded0f94c8fe19a70236e08136f55d0cd153ffa3fd4be021c07d2c595305a35741f3ab1d22e510722eaa98cf24d89fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD5510642b0a368b8d07fc5b23d36c3055d
SHA1852035c8b658d02822ef62444d0bc92c5c9ff4b4
SHA25652d72f491c5e61a23a508fc85c2cfa30573662f5f0cab066a533002a1bc9070a
SHA512aabfa0dde6911a349c44cec92466275904766aef27ca233de733a5713aadb7e8049f385e8577f6c33f44c056feb62c9fb2cdc930e05846b8a8d320b05dc14984
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD51a577f3d511d394accebc02b3a35ec7b
SHA159cf9fe2a354bb25408948f356267e9720f26429
SHA2562ffaaa950180e25ef00c137ef05f514ef98c84f2e7a21e71f31327e3d2c85d90
SHA512bc56ed171e47ae000dda4007d2b8786a17897220ca828190e35e45fd281b0f0a0a20b732950cb7271d6fbc2ebbc70143035469c21dcd1fb7d3ab70cc5b0a9b2f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD59db2e5f58ee1ffa2aa48c12c1be12632
SHA1342f37336a523f2f24461a891d3d91d167b744f7
SHA25683877044218955ea60a59e605debc5c42eaec128c49f4e5b6f5c4021f1d74580
SHA512b63460511cf43a8f68edea5a414363dbe015395bd326269a58ab288c432d93a31d0dc2e6b78a56ab5304a98c12e20b339938dbf5a5c6569114b196fa97e6a327
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD51a236b107252fd6a80516057477ccf8e
SHA15e9b31e3a8f06f2722a4f0369d3eee4108c2402f
SHA2560132d67267885b856a810e5d1e33342b628b9b8fda5c7034e95eb070e068d6fc
SHA5127318fed723a08765a52268cd66a97cd58a9a1f69f6cd6257b6169d77d92acfbdf63ef5f22ce2eb0169e666446b4ab1f52fb950472ec5442753772b721168dbc0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmpFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\note.txtFilesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
\??\pipe\crashpad_860_DZURYQHEXKXEEMFHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1