Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/04/2023, 13:47
230418-q3j8ysbg55 618/04/2023, 13:46
230418-q26essbg48 318/04/2023, 13:44
230418-q13yaabg33 418/04/2023, 13:41
230418-qy82hsbf99 318/04/2023, 13:20
230418-qk6dgabf28 318/04/2023, 13:18
230418-qkb5madd4z 318/04/2023, 08:57
230418-kwzgeaae48 318/04/2023, 08:54
230418-kva3escc3x 3Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2022-06-21 14.46.37.png
Resource
win10-20230220-en
Errors
General
-
Target
Screenshot 2022-06-21 14.46.37.png
-
Size
89KB
-
MD5
3db0b4a9231860087b407ab8e85f1877
-
SHA1
d7baf924e1778fe9637a35f1c751f33a9de74ab9
-
SHA256
022f3a5067ebcfad464cb62ae1326f82889cfbdb1f57409bec7ebb107dd8debf
-
SHA512
3b335c49df321d587a800650443c4338dcdbf18baa40832a2a515f2f525f0a099fde70014c6200206cb9c710843f535ec3d03abcddb56f8363e5c0da55163e24
-
SSDEEP
1536:OPgXyMXGRgughoErwSze6a1pzwFpHojLnZjAxYSBruStd0M+fQM/kB3QudKT8tCX:OOyMXG8aErizn8+tYD+fzuguna
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263047757284805" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4768 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 2552 3692 chrome.exe 69 PID 3692 wrote to memory of 2552 3692 chrome.exe 69 PID 4220 wrote to memory of 4200 4220 chrome.exe 71 PID 4220 wrote to memory of 4200 4220 chrome.exe 71 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 3692 wrote to memory of 3856 3692 chrome.exe 73 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76 PID 4220 wrote to memory of 3760 4220 chrome.exe 76
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Screenshot 2022-06-21 14.46.37.png"1⤵PID:2448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc0adc9758,0x7ffc0adc9768,0x7ffc0adc97782⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1760,i,11139108900921781744,12170326003945436710,131072 /prefetch:22⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1760,i,11139108900921781744,12170326003945436710,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc0adc9758,0x7ffc0adc9768,0x7ffc0adc97782⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:22⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1360 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:12⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4228 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4416 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4700 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4852 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1860,i,731062652530477591,16430251721702514820,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3acc855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5fbab354013f22bda4e6b9b30404ff61a
SHA1b23b36d993d4c87f3969b853e20d354a09c74c94
SHA256ef46d0cdabc081605ce6dd5e5ffdfd4cf7e1fd0c15e0a6061009e08fbd2dcf05
SHA512e338985644a5a4af0043c2e8a35e55017e7554559637ccedb663c6b74c75f2203d514adf483ebb5fbbc1b681a0d57fc22d4043f8c173ab1b831dd71216591439
-
Filesize
40B
MD5fbab354013f22bda4e6b9b30404ff61a
SHA1b23b36d993d4c87f3969b853e20d354a09c74c94
SHA256ef46d0cdabc081605ce6dd5e5ffdfd4cf7e1fd0c15e0a6061009e08fbd2dcf05
SHA512e338985644a5a4af0043c2e8a35e55017e7554559637ccedb663c6b74c75f2203d514adf483ebb5fbbc1b681a0d57fc22d4043f8c173ab1b831dd71216591439
-
Filesize
40B
MD5fbab354013f22bda4e6b9b30404ff61a
SHA1b23b36d993d4c87f3969b853e20d354a09c74c94
SHA256ef46d0cdabc081605ce6dd5e5ffdfd4cf7e1fd0c15e0a6061009e08fbd2dcf05
SHA512e338985644a5a4af0043c2e8a35e55017e7554559637ccedb663c6b74c75f2203d514adf483ebb5fbbc1b681a0d57fc22d4043f8c173ab1b831dd71216591439
-
Filesize
40B
MD5fbab354013f22bda4e6b9b30404ff61a
SHA1b23b36d993d4c87f3969b853e20d354a09c74c94
SHA256ef46d0cdabc081605ce6dd5e5ffdfd4cf7e1fd0c15e0a6061009e08fbd2dcf05
SHA512e338985644a5a4af0043c2e8a35e55017e7554559637ccedb663c6b74c75f2203d514adf483ebb5fbbc1b681a0d57fc22d4043f8c173ab1b831dd71216591439
-
Filesize
371B
MD598d87815f90ae86066b85bc406156347
SHA1c4becddb4b2073e69e5a943d8e1344502dab845e
SHA25653b249a91338c74ae014fdf40c9cf022d6bb6a0bbb3a213c40d9324ed23158cd
SHA512424e3874fb0608c4b03a4c8c30d42a05e06c696eb5d459a8fe05f05cb221667a13785c4497cad41fb079027601d72b148d4cf7fd093b2437989e858bbdc4b913
-
Filesize
5KB
MD5f40eb912743fefacb875e041cc79689f
SHA129f69cb6d62618d77bb8766558e59d15bb706324
SHA256d2934ea04c10181a5ec21abd9cc20af4feb7b6dc94c69ec14aabb9e5cc4f8ea4
SHA51220960da4663a18427b60666f644a6faf358fe417577e282e2141e506eadf8b74899f76482270eaa26cd035faeeccbfad53703b50833397a9c4e74b31c46519ae
-
Filesize
5KB
MD583262467ce692d29bb69038e0ca1997e
SHA1d2423788eb64e7bf6bdcc2aa8e138fe37b2c607b
SHA256446c6b3ebbbb12680d680c39fa333701b5dc007973b50b3227ea3b75dba91b34
SHA512b309225950c3f270e32f6d5bea502e418a3812bb004cfc5a803fbdf2cba9db70b3f3c849360d2ae94d2eb62b0f7c2ed721640b71dbdb6cf7b0a86eccaf82ff97
-
Filesize
71KB
MD524b8859f2d478a1f62b45116745a4614
SHA1bc50d13782003abeba8e466bdb6143ea0d70c467
SHA256a324344d3ea962e33c329168a18b2db94fb38abc99882ed0c2b8861128b99beb
SHA512502f0dcb83b869ed12d803aff0b3a4a3d89c6b8338b37ff96daa99b1c3819b2d81ee9c0bf08679cd12158ac28b57f6b7f335b4e06b230bcdeb1dd1b2977afec8
-
Filesize
71KB
MD524b8859f2d478a1f62b45116745a4614
SHA1bc50d13782003abeba8e466bdb6143ea0d70c467
SHA256a324344d3ea962e33c329168a18b2db94fb38abc99882ed0c2b8861128b99beb
SHA512502f0dcb83b869ed12d803aff0b3a4a3d89c6b8338b37ff96daa99b1c3819b2d81ee9c0bf08679cd12158ac28b57f6b7f335b4e06b230bcdeb1dd1b2977afec8
-
Filesize
199KB
MD576eacc7530ea3a0d6c0d90808f6a378a
SHA1acbc0a4742a48d9db5f7f86f21f10b66b87989a0
SHA256795a1ff5e95ea7acd7be28494829486d4005ab5071625b2800e594e483f25fb6
SHA5129839f5345d6ab905923bc36063440eb778b29b55027d43a1674738436205e228ee9c52dedac90bf05756e3d00f2d469261ac9158ae7353168e13fa08a1b558bd
-
Filesize
199KB
MD5930c6b8d720bdd66b1d9f1d33253f2fc
SHA163bb56f319ed1939f56b1a378a642858fdaf6799
SHA256cf43c6b456a20da84956179b9cb3b377eb24c63bcdcd65d8c7c211d22fa150ed
SHA512986c46413092a30786b394370d6e65c9e3a76261a2cadc2c733c7ec719061f5cda048a6b368599402a84add7f87fad8ca7a65da6bb39f7ca5f0830be1f05916c
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd