Analysis
-
max time kernel
1783s -
max time network
1502s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2023 17:42
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.0.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.0.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1416 javaw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 3836 WerFault.exe 42 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290785758293188" chrome.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1416 javaw.exe 1416 javaw.exe 3284 SearchApp.exe 1416 javaw.exe 1416 javaw.exe 4136 SearchApp.exe 1416 javaw.exe 1416 javaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1416 4500 SKlauncher 3.0.0.exe 84 PID 4500 wrote to memory of 1416 4500 SKlauncher 3.0.0.exe 84 PID 4292 wrote to memory of 3040 4292 chrome.exe 101 PID 4292 wrote to memory of 3040 4292 chrome.exe 101 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 4876 4292 chrome.exe 106 PID 4292 wrote to memory of 1616 4292 chrome.exe 107 PID 4292 wrote to memory of 1616 4292 chrome.exe 107 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108 PID 4292 wrote to memory of 4836 4292 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 3836 -ip 38361⤵PID:3400
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3836 -s 26201⤵
- Program crash
PID:2956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbd7369758,0x7ffbd7369768,0x7ffbd73697782⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:22⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:82⤵PID:2688
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3284
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\941d7837ed9c4d83ace92916eab03c89 /t 2940 /p 32841⤵PID:2848
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4136
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\71768651-0eed-4362-8ff3-6af12d433b07.tmp
Filesize5KB
MD51a6596fa82c9d33661fa5a24f0338293
SHA150996ab3089d8dd232cb5150dc26162df9309d33
SHA25659f3eb9d3f31b721a09969112046db37d23fe24d3a4fe948bb6ca9d31c25801c
SHA512b1786898fe5fa58bef6735c029915a941542518c35e9a3e25a6751029aa43337403c8e2ac4304d3381cd4949abe70308e4f6779b586b8faec55a927ecfc04326
-
Filesize
5KB
MD5357d1ca5e011c123729173ec48c36e22
SHA157452aa43d5a5db890ca9ba6f32728c08b93095e
SHA256bf89601cbe043f42aaf0503ee60240b5bcc270d894d3aa7852fbabbff17761e1
SHA512b69413dd34ddc1aa74a1f66fa9cf478a8377c549dc3658b37b787bea14aacf65d693a11414d9b210724db09ca1672d5606e31eb6fc99865c61218ecb7ac9a34d
-
Filesize
5KB
MD5e64efeb30727ae7c70a2a6d2a14a3613
SHA1b707fdd8c7249ce428638e7efbd3e3ffb4b24fc9
SHA256cb50b03c4fc95f78b5978c053cdbb81775c6f2981724148a2aa6a6e8999f437d
SHA51205c41c60025b09156964f511513e7097aa5c3f16822ba7cfb6ef004f5c45a42e911a386a07daa0e218c2ee5aa0aa88d207413be0818ccc1e9686ef0a688b7d1d
-
Filesize
5KB
MD5e47c0cbb59d11c95ab020cea7887ad93
SHA108571fa70ee74becd977d9bbee2c1667d7829bb6
SHA256122c8465128e8c189e2c9a70f241a761f8d43d1790517f556c866f79ea4c7c94
SHA512ac33552db6fb566ee1b44ebf88d72157738e8933ef65b792d7509fc9d65c175d3a50978a4f40387fa33e9517732f4392f308d6e94531ddd4b33d3dc510d32183
-
Filesize
264KB
MD510e05c3c2667de18efdc460960a48273
SHA18ace0f56f760e7762fc587fb59572207241057ca
SHA2560f4ed07a21e4a1e13050f72b99ae672e0d6a864ff58d3622a7e871b37f4b2e42
SHA512947f216d36e818d45ec4cfe31f79c2e4e23365348bd8055c58540975d619a688b3d9f81e3130d89ff2167da853d72095d42be84d886461ebd1fb2d9cb7e4a939
-
Filesize
71KB
MD5e840d70e202e1e7fc6f4764433e38882
SHA17ea3fef98c4c7db990e53c72afc704aa6a2864cb
SHA256ff75861344c876dd9cf891490bc1cb459c767640ba4a4016c5b797bac0b8e060
SHA5126f436f55f7c38b51cead6c259a4caa0642621e8a23ea118c6fa39d13c0f1ed0872e92e2727143bb0d5bb44ad342f6a0480e2a6469b25099ac46ef62793b80a8f
-
Filesize
71KB
MD53df2196ab2844b06a62b18d5d7dbd378
SHA1eed644bf9e19034b2b82e48dfaa0385930f7b04b
SHA256d89f34043cfa0183471fb5eea883632ec15caa868d88102709072b1bd8cd52c9
SHA5126dd8b1cd94863998ffd6484ff7858368976ddd7b9d1bf177e4385c1baf52933fbccb3af3a2e0f109e258e268dfdc703aca09ac324ac6bab119d8819885177ba4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{0A6AC72E-ED8C-C16F-38B6-05831557CF24}
Filesize36KB
MD58aaad0f4eb7d3c65f81c6e6b496ba889
SHA1231237a501b9433c292991e4ec200b25c1589050
SHA256813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1
SHA5121a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WindowsPowerShell_v1_0_powershell_exe
Filesize36KB
MD594b56d65a8b7f7253aeacac345d4b096
SHA17e11e248ae804d3647479a4fe5f03835a1eee4bc
SHA2560f312587a999305794730da6f2198c82a346e64211e2fb054256102ac70315be
SHA512538cc0c1b4dc66e8a3c6ca9a17ddac128441874248589bcc6c88b64ad7d3b93ff143867d6fad0002cbb4584e951d0e82441c350396e6d59b73207a3ffe0fc055
-
Filesize
9KB
MD5697d496ac9f5aaab8ae025322358c61e
SHA12043eac8cdcc2e24b854af1eacd77a5f2a395a27
SHA256a7273a4cf48ab3413f2c186cc95a3367a73ce99f8d45329383219d4cc27003aa
SHA512b6702cd49a3af9f97f697565136f140692af9f8b271e672f2e91c920a23212b778583786f2377078117113647926338614a92c4a2423318b7a21ba2fe3a89838