Analysis
-
max time kernel
88s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
Facture.html
Resource
win10v2004-20230220-en
General
-
Target
Facture.html
-
Size
1KB
-
MD5
5ddcc4cf49a6d35396437a884d529f0e
-
SHA1
415d46b87292377e45fbe51939d8c10a3120ff6d
-
SHA256
722b01a3177f0103fe3ce483741b155c9e7b2c924d762982ddc5aa55db61586e
-
SHA512
e69c50e44bff308423f8c4f5a7ab165af7386c812fc3c7548da594cd6cfaffe475b235f95e8c077a7ad0589afb53a605b40a3e5825043c6aea581463b0a84c04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5D3EC835-09FE-11EE-9F77-EA1737350EF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133311433962478284" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 64 iexplore.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 64 iexplore.exe 64 iexplore.exe 4132 IEXPLORE.EXE 4132 IEXPLORE.EXE 4132 IEXPLORE.EXE 4132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1968 1696 chrome.exe 83 PID 1696 wrote to memory of 1968 1696 chrome.exe 83 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1776 1696 chrome.exe 84 PID 1696 wrote to memory of 1428 1696 chrome.exe 85 PID 1696 wrote to memory of 1428 1696 chrome.exe 85 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86 PID 1696 wrote to memory of 4312 1696 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Facture.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3e6c9758,0x7ffc3e6c9768,0x7ffc3e6c97782⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:12⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4072 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5020 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5268 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5048 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5016 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5132 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5764 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 --field-trial-handle=1788,i,12749490661469338360,15178086956054626809,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4300
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:448
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Facture.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:64 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:64 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1000B
MD5fdd43b98311f5a2e35cea2de3f9cada4
SHA136777f785515c2cf11aef454e63017d9282551f8
SHA256a06789cedbec1fb99c0c2cb2f560509e5c81deeb5857858b33e7906d38ade76c
SHA51294c16d11b57ca2e00abc6b9aeb08327eb8f47facb852132cd0903bb9066b921f09a23a768121cc3a31d26812745b8ba6394f0af7cc98d181b4aedccd8f85d432
-
Filesize
6KB
MD5ab0532a0d32a709a41be834850b71fd6
SHA1a52b2d1a116fc218b171fe45fbd060f78ebfbfff
SHA256d9e61903b254971e5756f582258847307346a2969827d5c5d3892e4bf81e9d05
SHA512a8bfca79554e16547084fa294134cabd2ad3897e73202aaac822f996b3f373a14dda3134a2975a09bed603fcaabf793470f33b1525f583b0b26f22f37ed3b36e
-
Filesize
6KB
MD5b7068c4cf7765f8e05d005da4eb8bae4
SHA1cc8cbb0d6334011a54d1854f607801c4c77e3192
SHA256d315995e8583fc511b2b2bc54df4f35fba0e3397cb19e0e8664784064edec414
SHA512b43f8daa747962a2f7d6596e0e43f78459e2f3b9b9453e5cacfdff9f2f167c903ae475335e049b7990cc1cbd5eea8efc1139b133ae9b9f6ed3bfbfa68d5fc07e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d713a629-fd96-45ff-b346-21b7bf50f00e.tmp
Filesize15KB
MD539676e5abb92461969a98ec3802bc6a0
SHA13df3b1106d5e64cca2fc722927c59ccc9f930460
SHA256a8f9281c2063063180cfcbc2270c6c61abc30ba22ff8d544b3a5397736463bac
SHA5121f4b22410c3898048ecd0d6d8164fca79c0794526f1506ea6e1813e0b3ec445ea5dd74634a164a40b83b055b8c2782656054e70d362d5f6969f3e7e504a74280
-
Filesize
161KB
MD5f57db42a59f51c2270caabde629da35b
SHA19082ea2c621bcbc772bf380616d84dbef2fb8ab1
SHA2564be1403c363286c051c3a45b01391b5b03f6ca53af3dc89a68142c04d99f8356
SHA5129b250e53f7f111b0be07b7cdd1cece39e97ad11607846c8c199f16f94e76dd2cb76cf41e7df1e8d776c93edb64b20188863836a03b7affa8d0e3b13428b68b73
-
Filesize
160KB
MD5bdd4ab688dca78fb7e0733c0cc98f328
SHA183dfde9cdb35b9a2ab6ad393dffd4fefbd87a8fe
SHA256554ff5b7904d62101ffbc531126a6235af04869e1cc55a77451258c92e5d75ec
SHA512cd853a1dd7acea8dae79cf3388a5fd63ba65783bc94551a5a065da02c0f761156e73e19ebd01cfb9785eb308eb633b24c1878f2b7323e40d004b34bb9f63de59
-
Filesize
72KB
MD5f3a636d0eeace6dce0d81b4f349ca14f
SHA16dee3d2b7afb76dbace2958b19ba306ac517a8d9
SHA25679c689ee68cebfe9939923132a7a3e8b203dc85a6f1ae33b1e3814f19ad1063f
SHA51283a4c7c02e985559887dbdb799319b8af470ca958ae53bc4561ffed017fc7efe1e68385f839c4ba405683e05fffe0ede18ce62433111dacfd45255f2ae5ee784
-
Filesize
161KB
MD51adf8bd2c21d4fc594f32527aba63282
SHA1c73bc31496162303455364861f9cf62472352eb1
SHA256d8a248fd05690962c548ad772c698d0e818cf0b2afaa8d0c7d857d8238ced4c6
SHA512dc6ed1928e59b19795ec5995a407a35a6009157b243557dc15005610d1694228df4d144988f7fedd6887d6293c4a6228db21dbaf3ee31a55f16abfa522bc899d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1696_1237804548\81305ba5-2605-4e4e-952b-d2e54a062ffd.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1696_1237804548\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727