Resubmissions
31/03/2023, 14:34
230331-rxfh9acc75 7Analysis
-
max time kernel
69s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
npp.8.5.1.Installer.x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
npp.8.5.1.Installer.x64.exe
Resource
win10v2004-20230221-en
General
-
Target
npp.8.5.1.Installer.x64.exe
-
Size
4.5MB
-
MD5
cfe2387019f5b782ec50da652c334c5b
-
SHA1
07c3aabf4726964d6544f8ba2a1da2b17ef4e8c7
-
SHA256
89e09019b606f98a12c5bc8e8e75730044fe6d69619dea1dceb474da98fb7c0a
-
SHA512
42e703b32f2f0cbfb0681d477556c7aeaa0901f3e00e7b5cbedc680d7b3e3e19a0a2690edee6da3955a88ca4d7257c7ea50dbeef04edd303490142d56e36cf09
-
SSDEEP
98304:gNv7kL78FmamEC2E4j2t9DHyBMhDyGUSItJPXV2ixj/hCmfovOLo:gNwkFm+s9zFALVi6CeaIo
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1700 npp.8.5.1.Installer.x64.exe 1700 npp.8.5.1.Installer.x64.exe 1700 npp.8.5.1.Installer.x64.exe 1700 npp.8.5.1.Installer.x64.exe 1700 npp.8.5.1.Installer.x64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Notepad++\autoCompletion\cpp.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\php.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\cs.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\bash.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\rc.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\vhdl.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\cobol.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\nppexec.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\langs.model.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\java.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\batch.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\coffee.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\rust.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\typescript.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\gdscript.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\updater\LICENSE npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\nsis.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\krl.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\powershell.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\batch.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\universe_basic.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\vb.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\xml.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\plugins\NppConverter\NppConverter.dll npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\updater\README.md npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\updater\updater.ico npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\plugins\Config\nppPluginList.dll npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\localization\english.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\html.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\perl.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\javascript.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\lisp.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\cobol.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\powershell.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\nsis.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\sinumerik.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\contextMenu.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\BaanC.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\autoit.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\c.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\sql.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\updater\GUP.exe npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\cmake.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\typescript.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\perl.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\javascript.js.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\lua.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\fortran.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\updater\libcurl.dll npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\notepad++.exe npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\sql.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\vhdl.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\baanc.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\c.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\haskell.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\stylers.model.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\nppLogNulContentCorruptionIssue.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\python.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\actionscript.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\lua.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\gdscript.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\php.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\ada.xml npp.8.5.1.Installer.x64.exe File created C:\Program Files\Notepad++\updater\gup.xml npp.8.5.1.Installer.x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: 33 1372 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1372 AUDIODG.EXE Token: 33 1372 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1372 AUDIODG.EXE Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1956 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1356 1600 chrome.exe 33 PID 1600 wrote to memory of 1356 1600 chrome.exe 33 PID 1600 wrote to memory of 1356 1600 chrome.exe 33 PID 1956 wrote to memory of 1568 1956 chrome.exe 35 PID 1956 wrote to memory of 1568 1956 chrome.exe 35 PID 1956 wrote to memory of 1568 1956 chrome.exe 35 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1600 wrote to memory of 584 1600 chrome.exe 38 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37 PID 1956 wrote to memory of 740 1956 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\npp.8.5.1.Installer.x64.exe"C:\Users\Admin\AppData\Local\Temp\npp.8.5.1.Installer.x64.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:1700 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files\Notepad++\NppShell_06.dll"2⤵PID:2904
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files\Notepad++\NppShell_06.dll"3⤵PID:3056
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1732
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ad9758,0x7fef5ad9768,0x7fef5ad97782⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:22⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1660 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2184 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3388 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=576 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3884 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4028 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2944 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2932 --field-trial-handle=1316,i,7272071628245433722,9223206071028336153,131072 /prefetch:12⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ad9758,0x7fef5ad9768,0x7fef5ad97782⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=284 --field-trial-handle=1300,i,2755437540691511893,5567189067551039362,131072 /prefetch:22⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1300,i,2755437540691511893,5567189067551039362,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:2180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ad9758,0x7fef5ad9768,0x7fef5ad97782⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5913cf9310aa5dd30b254bbdaf4905de1
SHA1afcf4d92b7e44971c987d4d1eb88df9f3399e3f7
SHA25620e077c04b1c9fb477e41f9db18f89c539fa24dca175437f68c7b4c0595f37fc
SHA512071a9a76d6afb6815e787a78f8d7a42dac59ff60dd8ffb5df4930f4e8074dcc69ad13d8d81cfc27e22bd142722084d857a4fde909a9587f489de113e427d640d
-
Filesize
71KB
MD566a124f8d7153a6a1bd90aba5b7af205
SHA13bcc0ea59a8d5f672932395ca32bc4a50a0c7fe7
SHA256247c89d429c0a5c853b151d48a4a069d80aabd8a9c02ee3bd38b37eb5a2a1a0d
SHA51262bbb7eea827ae4dc0a5a0f1a0fd935d66542afb35a6874161386fb4928ef9cae13174f18ef874b48085e5c6066df3382520a32b1eeb697d3dfc8410eea10213
-
Filesize
40B
MD5c6e4431d295a1842fea0a903fba97f96
SHA1b61072829b60b8e757f84812d1e44ce318b8eb12
SHA256775ba22acda7362b3b8913914d10b3df1610e9ef9e11619c36c6607811bc9f93
SHA51215761feea1df597afc51529909961187188ce64601193513ecbe41bc8b22fb5877d48a8ce85ce45fb874c8ac51049bfb1eb6cff16164104bc53cbcc38737f5b0
-
Filesize
40B
MD5c6e4431d295a1842fea0a903fba97f96
SHA1b61072829b60b8e757f84812d1e44ce318b8eb12
SHA256775ba22acda7362b3b8913914d10b3df1610e9ef9e11619c36c6607811bc9f93
SHA51215761feea1df597afc51529909961187188ce64601193513ecbe41bc8b22fb5877d48a8ce85ce45fb874c8ac51049bfb1eb6cff16164104bc53cbcc38737f5b0
-
Filesize
40B
MD5c6e4431d295a1842fea0a903fba97f96
SHA1b61072829b60b8e757f84812d1e44ce318b8eb12
SHA256775ba22acda7362b3b8913914d10b3df1610e9ef9e11619c36c6607811bc9f93
SHA51215761feea1df597afc51529909961187188ce64601193513ecbe41bc8b22fb5877d48a8ce85ce45fb874c8ac51049bfb1eb6cff16164104bc53cbcc38737f5b0
-
Filesize
40B
MD5c6e4431d295a1842fea0a903fba97f96
SHA1b61072829b60b8e757f84812d1e44ce318b8eb12
SHA256775ba22acda7362b3b8913914d10b3df1610e9ef9e11619c36c6607811bc9f93
SHA51215761feea1df597afc51529909961187188ce64601193513ecbe41bc8b22fb5877d48a8ce85ce45fb874c8ac51049bfb1eb6cff16164104bc53cbcc38737f5b0
-
Filesize
40B
MD5c6e4431d295a1842fea0a903fba97f96
SHA1b61072829b60b8e757f84812d1e44ce318b8eb12
SHA256775ba22acda7362b3b8913914d10b3df1610e9ef9e11619c36c6607811bc9f93
SHA51215761feea1df597afc51529909961187188ce64601193513ecbe41bc8b22fb5877d48a8ce85ce45fb874c8ac51049bfb1eb6cff16164104bc53cbcc38737f5b0
-
Filesize
40B
MD5c6e4431d295a1842fea0a903fba97f96
SHA1b61072829b60b8e757f84812d1e44ce318b8eb12
SHA256775ba22acda7362b3b8913914d10b3df1610e9ef9e11619c36c6607811bc9f93
SHA51215761feea1df597afc51529909961187188ce64601193513ecbe41bc8b22fb5877d48a8ce85ce45fb874c8ac51049bfb1eb6cff16164104bc53cbcc38737f5b0
-
Filesize
264KB
MD5b606149a43acceadbf3d035b2824a817
SHA15764874860eeefe12dd15ea4c01d4994741d581b
SHA256496178337dd601dfed8369009702d953f8d48d527541f7af4d2db4a6b58436f6
SHA512cce481b9e1dc55051183731452aa1ca412f154b671c01433c71901aee8516dd28df503175bbdeffbb21beca3dbd46ef09461ace8149ddb2807b626d3e366d5ae
-
Filesize
4KB
MD53902233e11a334fda73129fc3a32f013
SHA1795b1b2ea0cadebf53b093bb02d80e074303c725
SHA25600a456d4d9e57b35cc41efee6e95dba8d57ea1ea6d7b6a14de5cd1adb90fb709
SHA5121a13a0a8b4bcbc5c6326fd2e335a2cfbfdb5a6c033149efbd0d53717ddaa7ae74010daa21424a891f6b6f0d5a60f5fc08dd587b170ed6b8ca076c64f600dae2b
-
Filesize
4KB
MD5f634d6c2e3b02d9b82e8b6a17a12d89f
SHA1e0655fa8ac935786d7efc280f1c06d7238c7e4ae
SHA2565964220ece32ff8629c28ca80a1293f33796762f4315de5c057b1049651ec207
SHA512d4fe668cc2de815351bf01961e0b7543761cd796df9a4b98f0a223a66e3a595229d7e2e953fe8ce2f872dc82325d010b05e4ff0592cc5344dba08f8bdf5234b6
-
Filesize
4KB
MD5036632ba6f0aa68efaf0e1062565f6fd
SHA17016edec72765d6eff5c3ee0f955cae757631c2e
SHA2568bbafce923b96751c9c80264adf0f51bc63f4bc5f6118814a4c73ab9f83796c3
SHA512ae09785160962e4e80d0e6549f77866037a20f64abb3c8f08b0c7960802a0deaabe4d497545c08936772e4d9d0e5a537332d1bda7452aa0910f6159be375ce42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
71KB
MD566a124f8d7153a6a1bd90aba5b7af205
SHA13bcc0ea59a8d5f672932395ca32bc4a50a0c7fe7
SHA256247c89d429c0a5c853b151d48a4a069d80aabd8a9c02ee3bd38b37eb5a2a1a0d
SHA51262bbb7eea827ae4dc0a5a0f1a0fd935d66542afb35a6874161386fb4928ef9cae13174f18ef874b48085e5c6066df3382520a32b1eeb697d3dfc8410eea10213
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
71KB
MD5c487754962e7215350c54445666e8b10
SHA160497eb5c326df405e877cb0e00de2097f755da5
SHA25680040922693c57bb5bbe2eacdad1d4fd227de5e2296f0aa8e2eb37160999398b
SHA512691bf53dc627e176938f53fc65bb70349adfb34721e0fe8b9d5fb55f5d237fe2e73dbcc9c5f6ac37d4fc3745fe6e3fa2eb0b5edce8cb766b6ca33a8e26335f76
-
Filesize
15KB
MD5ece25721125d55aa26cdfe019c871476
SHA1b87685ae482553823bf95e73e790de48dc0c11ba
SHA256c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA5124e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480
-
Filesize
1KB
MD55cd5f1c5078d6ef78cef901052be64a6
SHA1968f19089f8746e2e4a0bb0e8a4daad213e80b67
SHA256a1a049f2d35f5e5de918b0bcd610e4dbd7b21a2572867120ba12d38e2ef1eefb
SHA512469d47320779bef9b2f60429f7cf087bd1b949d4c9a31713baec6da297bb1b72cfd063ff428f96c310fbf7057dd9fceaec5663ce06824d4c31cf5dbd72a660cd
-
Filesize
1KB
MD57ccf870aba80e47c074ca3194fc5b3eb
SHA12c06a7a5f755100bd12432d6b91970161f7da4e5
SHA256c835cdeb1dd57db7a9d68178ff9d2b5f776991a1f4fa093a08473c0a7d5c7ecf
SHA5126eebb66bb2ecf367779142639f52f66dbf070ef6fffc2556ddd18743284106e7ac5abd3fa92a9f697764ef4521a026ab41f9292bef291b218895131656ba0da3
-
Filesize
227KB
MD5913cf9310aa5dd30b254bbdaf4905de1
SHA1afcf4d92b7e44971c987d4d1eb88df9f3399e3f7
SHA25620e077c04b1c9fb477e41f9db18f89c539fa24dca175437f68c7b4c0595f37fc
SHA512071a9a76d6afb6815e787a78f8d7a42dac59ff60dd8ffb5df4930f4e8074dcc69ad13d8d81cfc27e22bd142722084d857a4fde909a9587f489de113e427d640d
-
Filesize
227KB
MD5913cf9310aa5dd30b254bbdaf4905de1
SHA1afcf4d92b7e44971c987d4d1eb88df9f3399e3f7
SHA25620e077c04b1c9fb477e41f9db18f89c539fa24dca175437f68c7b4c0595f37fc
SHA512071a9a76d6afb6815e787a78f8d7a42dac59ff60dd8ffb5df4930f4e8074dcc69ad13d8d81cfc27e22bd142722084d857a4fde909a9587f489de113e427d640d
-
Filesize
6.3MB
MD5bb24aa8a09b93378bb1f2e343285fbe4
SHA1284c7232c0f54df1b242ddf66ef242f965f46bd4
SHA25612eafb63d94d4d73bcefccd12cc103bdb6dbc4abe89cf4cc544103ea19c96e5d
SHA51246f40476a317f7aa33238ab867db2d8882b335d3113b2edcdb54808e8e73849c14ccf08aa94557432e48d04f3d88e01c6e578bc56fbfbcc35e02fe26823b361f
-
Filesize
15KB
MD5ece25721125d55aa26cdfe019c871476
SHA1b87685ae482553823bf95e73e790de48dc0c11ba
SHA256c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA5124e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480
-
Filesize
15KB
MD5ece25721125d55aa26cdfe019c871476
SHA1b87685ae482553823bf95e73e790de48dc0c11ba
SHA256c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA5124e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480
-
Filesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
4KB
MD52f69afa9d17a5245ec9b5bb03d56f63c
SHA1e0a133222136b3d4783e965513a690c23826aec9
SHA256e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0
SHA512bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355