Analysis
-
max time kernel
782s -
max time network
729s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 18:47
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://linkwotowoto.club/new/two.php
Signatures
-
Kutaki Executable 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000700000002321d-570.dat family_kutaki behavioral1/files/0x000700000002321d-571.dat family_kutaki -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 2 IoCs
Processes:
Tax Payment Receipt.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skvqggfk.exe Tax Payment Receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skvqggfk.exe Tax Payment Receipt.exe -
Executes dropped EXE 1 IoCs
Processes:
skvqggfk.exepid Process 2900 skvqggfk.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133315012823130419" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.execmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exemspaint.exechrome.exepid Process 4364 chrome.exe 4364 chrome.exe 3080 mspaint.exe 3080 mspaint.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
Tax Payment Receipt.exeskvqggfk.exemspaint.exepid Process 2464 Tax Payment Receipt.exe 2464 Tax Payment Receipt.exe 2464 Tax Payment Receipt.exe 2900 skvqggfk.exe 2900 skvqggfk.exe 2900 skvqggfk.exe 3080 mspaint.exe 3080 mspaint.exe 3080 mspaint.exe 3080 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 4364 wrote to memory of 3192 4364 chrome.exe 86 PID 4364 wrote to memory of 3192 4364 chrome.exe 86 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 3704 4364 chrome.exe 87 PID 4364 wrote to memory of 1920 4364 chrome.exe 88 PID 4364 wrote to memory of 1920 4364 chrome.exe 88 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89 PID 4364 wrote to memory of 1288 4364 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://opal-advisory.com/407.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce88a9758,0x7ffce88a9768,0x7ffce88a97782⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:22⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:12⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4480 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5388 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5572 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5496 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5604 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5232 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5448 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 --field-trial-handle=1792,i,2936234857407532230,16535429160220476440,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4432
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1552
-
C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"C:\Users\Admin\Downloads\Tax Payment Receipt\Tax Payment Receipt.exe"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp2⤵
- Checks computer location settings
- Modifies registry class
PID:3984 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapimage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skvqggfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skvqggfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD5062d58700284a21a561e24903400771e
SHA1745643cf32736a976b67038172491856359c1332
SHA2566cff4438e761eb617df2a01d0cf436bae14f2af4b67f3a5e382123c0a1762a7e
SHA51277ba3712dfee97f4f89a74a1e2867d244f2a828a3dac97d96384ee376f88dda14eaa8a5fe910e1879ac1ee89eb2cd6bc2976d8766d0f645aab0fb2b288553131
-
Filesize
6KB
MD507a882696ac67656661792fe1303a1a7
SHA1f093d3dd17974d9cef98c0298c50976d46fcd027
SHA25671722b8879d8c2683d7b4833c1c0f2a6f28d423939065e94ab29aa2ebefc6047
SHA5126751c708c4f0d0c2e21d6a21741fcfbab348dac82b4e3b5bc61ff353b6b2b0b8956dd69b1a333eae70213f3f7b0ec0ff7c09c9809aacbf3da895ffd1c767df00
-
Filesize
15KB
MD5c08184f65591db892db8ee791944a1b3
SHA10c0e327816dd0c619e7d50d19bc4d54bdced7d0c
SHA256c896fa85d3bed77a1aff51ef73936143d13e73f5d1dd67b00a557c113cfc316a
SHA512978cbf152a015f1cde55846d0341a171907fc16788b4f2c2242f2b1ccdfb9e33193e42f3cd71987723d3399cd378bb63db45aa4b3c26af094aed46b353ba791a
-
Filesize
157KB
MD5b5aaf67a1824fecd2de7d4751bd5d252
SHA173b8f352bade631a73b84ec9c3f9ceb37a6f22af
SHA25683dcb3cd3e60ffb0dbfb32f9ce86ed3e1bfe32fa4edbd150386ad421d7fed2b3
SHA512e044d984f8770ac03524467df0c96160dc2bf3751f9becaa3d0551195a7a8d7fa54505061d464eabc46ef3ead09999d02bf3d57746bb65ee238050bba5f793bc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4364_1660701355\1d2c754a-c895-4642-a474-8d2c2dcfc52c.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4364_1660701355\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
641KB
MD50b769e0757ebbcb320f3969b039cdbf2
SHA1d0e44fe2090c304d75cfaedc84278bb887bd6e69
SHA256612c1442c0fe05cba647aafaad062e03dd3064b5f9f506fe5bf130487249633c
SHA512b3711d21273c89fdfb92e78d841fe087c2ec8845f51f804fbbf6ad908b658706046452d9de7dc8cc78b5b3624fc484fa2855ae5a8863e6a8531a26ff5e657fde
-
Filesize
435KB
MD55ece1785dde8c3fc41573f0108cc866a
SHA1c8ecf3eb089a1c5bff5dd1f3acd30b73d932b950
SHA256f474e940c440282a407c16beabb4ee6434edc1636f2209f8590b1e82a2c564c9
SHA51292442b600198b1a677413b690d70dbc07ceba9be2c80a341f43d1945aa7cb680e61ed2cfd2e0827c96fd137802910a2f49dee6758b1f5d7b5acad9cc5a5979d7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e