Analysis
-
max time kernel
78s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 23:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3L1GnWh#TQT.html?od=1syn6435cce632f2911v4.3s41gh8.S0000ri34k91nrw05t_x11363.i34k9MWt6Nmd5LTBwcHUwbGo0u6Nvi
Resource
win10v2004-20230220-en
General
-
Target
https://bit.ly/3L1GnWh#TQT.html?od=1syn6435cce632f2911v4.3s41gh8.S0000ri34k91nrw05t_x11363.i34k9MWt6Nmd5LTBwcHUwbGo0u6Nvi
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs msinfo32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMinorRelease msinfo32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133268595806380196" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 536 chrome.exe 536 chrome.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4244 msinfo32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 536 chrome.exe 536 chrome.exe 536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeDebugPrivilege 3464 taskmgr.exe Token: SeSystemProfilePrivilege 3464 taskmgr.exe Token: SeCreateGlobalPrivilege 3464 taskmgr.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe Token: SeCreatePagefilePrivilege 536 chrome.exe Token: SeShutdownPrivilege 536 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 536 chrome.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 2560 536 chrome.exe 87 PID 536 wrote to memory of 2560 536 chrome.exe 87 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 4208 536 chrome.exe 89 PID 536 wrote to memory of 3384 536 chrome.exe 90 PID 536 wrote to memory of 3384 536 chrome.exe 90 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91 PID 536 wrote to memory of 1260 536 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/3L1GnWh#TQT.html?od=1syn6435cce632f2911v4.3s41gh8.S0000ri34k91nrw05t_x11363.i34k9MWt6Nmd5LTBwcHUwbGo0u6Nvi1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1dbb9758,0x7ffd1dbb9768,0x7ffd1dbb97782⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:22⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:82⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4428 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1812,i,7175273480387563437,14732150797800580028,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2076
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3464
-
C:\Windows\system32\msinfo32.exe"C:\Windows\system32\msinfo32.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:4244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5c74d1b9-4e89-4443-a2ee-65d7044383a7.tmp
Filesize15KB
MD5603f3a6fe78369ffbee37099ae12ea56
SHA10a6e2a7966bff9d2ff5ffbb2ebd40e99c559279a
SHA256292d94aa3603cbd402852fbbaeb40e8a281df0f4e40dca8973e111feb0c2afc7
SHA5121a8a48f1fd10c93ec0d25935874420a2a35217a109399843cb813168539285ea9cd58a83d96c3a34908acad545a98183d62f046504bbc336954afc17131a6673
-
Filesize
946B
MD57ad5953272f2d65dabb9b0a01c6b5aa0
SHA1c5bdd768cff1f4521c41fbf54b9e4714fbe441f1
SHA256940e9da2fc0c17e4d33cb4b6af072e5d1e755fe39ae66db7f59d9392c8eb1f0d
SHA512b7cbf07c86abb2eb63b660dd0de1d666fc3a22a576ad4f9a1d708f25a7abcb729247090c36d85b50fb23fa99ce91409a654dbbdb80bab09fd84d32e932ac5d59
-
Filesize
6KB
MD526b60517682c851416e5644ab3dc9adb
SHA10c99b54508e49be31504f929c382ac3bd9ff5800
SHA256d10208e734d8519d3961b418c2fc32bfb55b1c00eabe651ba16bbd813a54f64a
SHA5124892c6bfa7e582279725c2dac6b34071b4c934c613017dcb306848f11d79250bb65604af8aa9a909b88dbc1a1021f7fdea1de5dd8fc297119aa094eb5dd4cee0
-
Filesize
6KB
MD58a2c46e55c026482440a82be04811cc9
SHA14e6f37477dd2c9649934e435b201d2785ad8fd0e
SHA25670be30f2c55f1832b5d00edea900777bbb4bbb58b4529df6f19d09355f8e1987
SHA51276ddee694897842da194e33fbad446af63ef1530bd3933f593422784a7f86aee6aad5f5aee540beea0ca7c0a18b8f62977f02ad80601a99575844ac0499e9665
-
Filesize
15KB
MD507961430bf23f3762b38ac187e2bc207
SHA1896eb74425e30559963946b97912c3e80bea4a28
SHA256b7dc8e690ca18d5a49ecd72265d545c2c2968f24bcddbdef3c151564582ec23a
SHA51290c466e92d8afa462e4eeb7408b5f918f0eabcc568341c2f388651ea5564c1f2589d0d178a6b1b0f4a270092be870ab18fabf9daceee766c3ddbccc3b870dd19
-
Filesize
200KB
MD560975efed2a61e93924e808cd8297243
SHA1b7f77534d72cd7f3a2afa143910de08c34bf2355
SHA256297ffd734b187131b3a6a69fdc1f7ed82f9af8c54fb59c3374e252e1c198ed93
SHA512388f8fd317dc1d97c5de244390154c157d7ac99352759af99caf4ad5be22a18b044d34b0f2b1da5a81ba559d053e0bc4512d882bf2622cb7c554685cd7949c75
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd