Analysis
-
max time kernel
1800s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 17:49
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0003000000022f12-603.dat family_kutaki behavioral1/files/0x0003000000022f12-604.dat family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
TDS.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oxyvzefk.exe TDS.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oxyvzefk.exe TDS.exe -
Executes dropped EXE 1 IoCs
Processes:
oxyvzefk.exepid Process 2248 oxyvzefk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133314977802039651" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.execmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exemspaint.exechrome.exepid Process 432 chrome.exe 432 chrome.exe 2816 mspaint.exe 2816 mspaint.exe 676 chrome.exe 676 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe Token: SeShutdownPrivilege 432 chrome.exe Token: SeCreatePagefilePrivilege 432 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid Process 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe 432 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
TDS.exeoxyvzefk.exemspaint.exepid Process 3868 TDS.exe 3868 TDS.exe 3868 TDS.exe 2248 oxyvzefk.exe 2248 oxyvzefk.exe 2248 oxyvzefk.exe 2816 mspaint.exe 2816 mspaint.exe 2816 mspaint.exe 2816 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 432 wrote to memory of 3428 432 chrome.exe 84 PID 432 wrote to memory of 3428 432 chrome.exe 84 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 5100 432 chrome.exe 85 PID 432 wrote to memory of 1728 432 chrome.exe 86 PID 432 wrote to memory of 1728 432 chrome.exe 86 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87 PID 432 wrote to memory of 4440 432 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://opal-advisory.com/jti.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfe729758,0x7ffcfe729768,0x7ffcfe7297782⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:22⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:12⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5052 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5172 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5328 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5340 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3728 --field-trial-handle=1824,i,16797304953937553781,9302646909012758212,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4656
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4548
-
C:\Users\Admin\Downloads\TDS\TDS.exe"C:\Users\Admin\Downloads\TDS\TDS.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:3868 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
PID:4928 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oxyvzefk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oxyvzefk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1000B
MD59dae9de0d1a9369acc7c959c7ffd62c7
SHA170523b882a9301d7feb1fac4d323bcc47fbf8bae
SHA25616bbb424f485b812945ec0313d1870279ae50d369e7d18f23f1c37723fcf7b82
SHA512933c7151b5bcc798b8a69b8c1997c8691797d0d2e8652f076f5254cbd80ee46df92eccf4c95b59a00191a9fee1923e7fb6b07eec26fa72daa0cdfba22471ca4a
-
Filesize
6KB
MD55f6728d8a7abe59f242954519eb1128f
SHA168b30f772f450fa2f4523e4d1894f59382fb6416
SHA25693db3358d7bd26c1ed534d9d08c94b6fb1d587832c6ccd5f35cf0d4ea59bc9e8
SHA512c0fc9fd845c6673157051714dd5ba8dc86de475381d1d525e4efee8790748a31fb0bc6967d530cbbc9376c1c21b9f9e3c257d699fb1dbc5be4348bd0572824f7
-
Filesize
6KB
MD5c22288559b7d35c1336025439d30ae3c
SHA11a95b94c9ce5daf134c0e49fb730a77c21694003
SHA2565af4ec173fdd04c340f5333b0abaed06e4dcf946039fa9321aa2313a06e66bd3
SHA512ffb9c4a5914ac82bfc5083aade8d36926f84317eb9bb73434ecd471fd29cf0d1d6aeb9039c1eab96b6cba56848ac5f587cca2e0aa78e147881463c68d4e07be6
-
Filesize
15KB
MD5031e15f6fe394c6631c3d1446954075b
SHA1a5b1f3c83d35cf746ece9a2012036e12887a805c
SHA256005b4718a1736c05b21db33cb3b5c129cce9f1a078766c0b4dca68c332567363
SHA512c967992130a44045ba446ba0211ed994357cee91668f99ff18bcc9b7700e99c5865992e1b955c61032a87a9677dc91f66902ae095c5655799d70b83a71d7b1e9
-
Filesize
157KB
MD5e76d0883e075cf95e7ac659099734fd7
SHA17de2977771fdee7308df978c697cf3efffbc11ee
SHA25649e11a6c92aa42d058def281e6e14202101263c475b4c6e5077c97c4a3bcc83c
SHA512d05f490f3cbb6212196de6044c9bd25af99313ea32755e910e0d7b7269ca40e2b93d4f2dc3d16885363874301a84ab4ea4aec2e9d6a0f43c79d0ddc3ba326e23
-
Filesize
106KB
MD5f277c61c166131c4a6e7b597491a2f38
SHA1e898e5d8722b1094207c04aa1aaa444c8b22312b
SHA25670a25fe9fc534e70f16ba6fed2939f970b0400dc2014e49f3bb3ee7c54bf54d1
SHA51276fe018fd7cfdf07effafb9de1c7e2dee6631b2d3c2bdad01dded82438411fcd2a924d41a8c6a4d568b5c0f4943141135171b82bd81a0e91d6150caaba70329a
-
Filesize
102KB
MD56ec64b104d11103bdc3562588f2db6f9
SHA1402aaf8f48a721bfc6345c951b10612821495ff8
SHA2566a46309995aca2181c1c4710d074cd765c35bb8d46438996ad3dc64caf1b2747
SHA512b0d4491d799ca70eed889675db08dc8d044a9574be8cd6a22203feaaaefd0b96bebbbcd45cde763170735e19a30010b790ddce77e59415b5a4446fed01bbf874
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
641KB
MD5d42db66314c69f0edb2a3e9c5050e206
SHA19d86c1636ff9a7b2f3733a194208799aa78c9b3a
SHA2567be9ec40125e555f4983466cc38b617265a9e761e81fc618805acc4a76563375
SHA51268a7e7dadab6b036963bf1e9ef88e55d473dcc4770a82bc041d552ebeebf71b66635520f5ae1da20b34dca6fe9dbfff826e686a5499ed008d076d0f992a0e524
-
Filesize
641KB
MD5d42db66314c69f0edb2a3e9c5050e206
SHA19d86c1636ff9a7b2f3733a194208799aa78c9b3a
SHA2567be9ec40125e555f4983466cc38b617265a9e761e81fc618805acc4a76563375
SHA51268a7e7dadab6b036963bf1e9ef88e55d473dcc4770a82bc041d552ebeebf71b66635520f5ae1da20b34dca6fe9dbfff826e686a5499ed008d076d0f992a0e524
-
Filesize
435KB
MD545c833c41261ceadf9f32788b0d455c0
SHA15bf53005f1773741f18910eb17a90019e0563235
SHA2563deaa710705edb01e4403fca3f413d4f9978a4fba3101f4670cc17dbfbe1f90d
SHA51256dedda26e9293d33b962e2ed84cef9fa4ec2d918946b4618ce68ecdacb3cf6bf9894e4429d8231e6249f00b7ad8a82dd0de351a38e2201e97f2b4f9b3f5069a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e