Analysis
-
max time kernel
77s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2023 17:08
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 6 IoCs
Processes:
resource yara_rule behavioral1/files/0x0002000000022efc-579.dat family_kutaki behavioral1/files/0x0002000000022efc-580.dat family_kutaki behavioral1/files/0x0003000000022efc-597.dat family_kutaki behavioral1/files/0x0003000000022efc-599.dat family_kutaki behavioral1/files/0x0003000000022efc-607.dat family_kutaki behavioral1/files/0x0004000000022f33-611.dat family_kutaki -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.execmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 6 IoCs
Processes:
Tax Payment Receipt.exeTax Payment Receipt.exeTax Payment Receipt.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe Tax Payment Receipt.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe Tax Payment Receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe Tax Payment Receipt.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe Tax Payment Receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe Tax Payment Receipt.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe Tax Payment Receipt.exe -
Executes dropped EXE 3 IoCs
Processes:
wgfnvbfk.exewgfnvbfk.exewgfnvbfk.exepid Process 3776 wgfnvbfk.exe 4840 wgfnvbfk.exe 2640 wgfnvbfk.exe -
Drops file in Windows directory 3 IoCs
Processes:
mspaint.exemspaint.exemspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 3340 taskkill.exe 2824 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133314089502436779" chrome.exe -
Modifies registry class 4 IoCs
Processes:
cmd.execmd.execmd.exechrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
chrome.exemspaint.exemspaint.exemspaint.exepid Process 2000 chrome.exe 2000 chrome.exe 3232 mspaint.exe 3232 mspaint.exe 3332 mspaint.exe 3332 mspaint.exe 4772 mspaint.exe 4772 mspaint.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe Token: SeShutdownPrivilege 2000 chrome.exe Token: SeCreatePagefilePrivilege 2000 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
chrome.exepid Process 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe 2000 chrome.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
Processes:
Tax Payment Receipt.exewgfnvbfk.exemspaint.exeTax Payment Receipt.exemspaint.exewgfnvbfk.exeTax Payment Receipt.exemspaint.exewgfnvbfk.exepid Process 3120 Tax Payment Receipt.exe 3120 Tax Payment Receipt.exe 3120 Tax Payment Receipt.exe 3776 wgfnvbfk.exe 3776 wgfnvbfk.exe 3776 wgfnvbfk.exe 3232 mspaint.exe 3232 mspaint.exe 3232 mspaint.exe 3232 mspaint.exe 4164 Tax Payment Receipt.exe 4164 Tax Payment Receipt.exe 4164 Tax Payment Receipt.exe 3332 mspaint.exe 3332 mspaint.exe 3332 mspaint.exe 3332 mspaint.exe 4840 wgfnvbfk.exe 4840 wgfnvbfk.exe 4840 wgfnvbfk.exe 4640 Tax Payment Receipt.exe 4640 Tax Payment Receipt.exe 4640 Tax Payment Receipt.exe 4772 mspaint.exe 4772 mspaint.exe 4772 mspaint.exe 4772 mspaint.exe 2640 wgfnvbfk.exe 2640 wgfnvbfk.exe 2640 wgfnvbfk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2000 wrote to memory of 4416 2000 chrome.exe 84 PID 2000 wrote to memory of 4416 2000 chrome.exe 84 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 2688 2000 chrome.exe 85 PID 2000 wrote to memory of 1180 2000 chrome.exe 86 PID 2000 wrote to memory of 1180 2000 chrome.exe 86 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87 PID 2000 wrote to memory of 2112 2000 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://opal-advisory.com/407.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe00489758,0x7ffe00489768,0x7ffe004897782⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:22⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4452 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5344 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5212 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5212 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3820 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5312 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3816 --field-trial-handle=1792,i,13649090805651657173,9109522859550815443,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1672
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1720
-
C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp2⤵
- Checks computer location settings
- Modifies registry class
PID:352 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3232
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:724
-
C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:4164 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp2⤵
- Checks computer location settings
- Modifies registry class
PID:4404 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3332
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im wgfnvbfk.exe /f2⤵
- Kills process with taskkill
PID:3340
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4840
-
-
C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp2⤵
- Checks computer location settings
- Modifies registry class
PID:4108 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im wgfnvbfk.exe /f2⤵
- Kills process with taskkill
PID:2824
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wgfnvbfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD51c68562c357317ab673552fa05ab67a6
SHA1aa38ce821183d36eab6ad6d030d69c6fcd5b3635
SHA256d04fae7c605ac7962c5aff045de3c33c58ff76b4c06c38af0bcd5c81f69c9e39
SHA5127ef1685588016f15b463d8aef0edb55fcdea430b21cdf7a34d25591d6c9192881df3068fd723d91d6baf40c4e2d3d02b801b0e663dcdc3f4914ec97e80a7cfa4
-
Filesize
6KB
MD59808c38903eaf286c1e6a2c54c55bdd9
SHA115e882a12ab775f78069d6a4c78897f9355e98f2
SHA256eedbf96b7f861704aff87d3c47c951acec5df870eb3514fcdd609e5702512d88
SHA512b50f38f4ceb7629496d636aa0d32b4dfee03b465be617a06ce75f605ebc5fc343191c25a77454b443fd2e4f41750596fa9043dbbc161c77c61bc75f90cfca7c1
-
Filesize
15KB
MD53031d2aca8fce5feeceb9ba0ecdbbbfa
SHA19b1f8b8806a55ea3efcf0b9dd44ca520e87dc19e
SHA2562db9d9721e62cbcd5c994a3621a914feaed4c5b1a2ea1fd71cfc9b5b6fe78822
SHA512fbf91957aca6eebb4efd365c5cef1fbdc826aa18807a63a5d0c7a7b204437d994d7a0834b53b65660d878d67a3939a8e9211063308fe8d2a90157ce2128beeeb
-
Filesize
157KB
MD5e31cbde2470f61fb3a7779c1a9145994
SHA15ab27d08e199fb93384564bef9ba5cc5a44927a4
SHA256e52300a4008a2b14ef258820145e7b154d95e65988c3f718e0aee7d4e565558c
SHA5121d7f34d1726f8a8efd55b0ceede01373765a10fabb647482b8bb558f12ca6831895b3440d4c0f4dccd447865b86e47fb18f03f3f16dc9149803c9c0049892796
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2000_2019922415\88880356-a615-4a73-99f2-0423b34ae5fe.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2000_2019922415\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
435KB
MD55ece1785dde8c3fc41573f0108cc866a
SHA1c8ecf3eb089a1c5bff5dd1f3acd30b73d932b950
SHA256f474e940c440282a407c16beabb4ee6434edc1636f2209f8590b1e82a2c564c9
SHA51292442b600198b1a677413b690d70dbc07ceba9be2c80a341f43d1945aa7cb680e61ed2cfd2e0827c96fd137802910a2f49dee6758b1f5d7b5acad9cc5a5979d7
-
Filesize
3KB
MD5316803354462dce2fd29581376f310e7
SHA15f6c5d8e0cbb4ec1ce7b218a95032847e8406317
SHA256ddf78af7d15cf1dc9cbb5dc0bb94c1d9343474842bb85ae81145e3ba55677909
SHA512fcda73c1ef94471f2b3cee77d396a60955dea90e21804a0f416d53223573a6e373944035af5ae8c3f9ba59b6f6c8fdd8d8e44cff262e6d78e0dd745e22d6a0a7
-
Filesize
7KB
MD5f0da667513a72a17a968df39efeb450b
SHA134fb41683b00d62a1bce0f328ed0fd8710cb0ac6
SHA256950e344609eeeefacc4ff25c49bf369a05b32d87453a8bb05c4f4469f8cdb0f1
SHA512fdf4671efa8be2d66509143d5880447cd2c86611151f1d1f1f64047165ce64ffcfe94766708ae2010c5a82d5efd6c0ee707f25d51ef4515e4cf348d960ffcca0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e