Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
17.5 - @LOG...#4.rar
windows10-1703-x64
6BR_128.201...st.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201...fo.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201... 1.txt
windows10-1703-x64
1BR_128.201...st.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201... 1.txt
windows10-1703-x64
1BR_128.201... 2.txt
windows10-1703-x64
1BR_128.201... 3.txt
windows10-1703-x64
1BR_128.201... 4.txt
windows10-1703-x64
1BR_128.201... 6.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201... 1.txt
windows10-1703-x64
1BR_128.201... 2.txt
windows10-1703-x64
1BR_128.201... 3.txt
windows10-1703-x64
1BR_128.201... 4.txt
windows10-1703-x64
1BR_128.201...fo.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201... 1.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201...st.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201... 1.txt
windows10-1703-x64
1BR_128.201... 2.txt
windows10-1703-x64
1BR_128.201... 3.txt
windows10-1703-x64
1BR_128.201...lt.txt
windows10-1703-x64
1BR_128.201...le.txt
windows10-1703-x64
1BR_128.201... 1.txt
windows10-1703-x64
1Analysis
-
max time kernel
123s -
max time network
162s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
7.5 - @LOGS_CENTER #4.rar
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
BR_128.201.41.41_2023_06_22_23_48_50/cookie_list.txt
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
BR_128.201.41.41_2023_06_22_23_48_50/cookies/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral4
Sample
BR_128.201.41.41_2023_06_22_23_48_50/history/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral5
Sample
BR_128.201.41.41_2023_06_22_23_48_50/system_info.txt
Resource
win10-20230703-en
Behavioral task
behavioral6
Sample
BR_128.201.76.105_2023_06_27_00_34_21/autofill/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral7
Sample
BR_128.201.76.105_2023_06_27_00_34_21/autofill/Google Chrome_Profile 1.txt
Resource
win10-20230703-en
Behavioral task
behavioral8
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookie_list.txt
Resource
win10-20230703-en
Behavioral task
behavioral9
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookies/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral10
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookies/Google Chrome_Profile 1.txt
Resource
win10-20230703-en
Behavioral task
behavioral11
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookies/Google Chrome_Profile 2.txt
Resource
win10-20230703-en
Behavioral task
behavioral12
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookies/Google Chrome_Profile 3.txt
Resource
win10-20230703-en
Behavioral task
behavioral13
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookies/Google Chrome_Profile 4.txt
Resource
win10-20230703-en
Behavioral task
behavioral14
Sample
BR_128.201.76.105_2023_06_27_00_34_21/cookies/Google Chrome_Profile 6.txt
Resource
win10-20230703-en
Behavioral task
behavioral15
Sample
BR_128.201.76.105_2023_06_27_00_34_21/history/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral16
Sample
BR_128.201.76.105_2023_06_27_00_34_21/history/Google Chrome_Profile 1.txt
Resource
win10-20230703-en
Behavioral task
behavioral17
Sample
BR_128.201.76.105_2023_06_27_00_34_21/history/Google Chrome_Profile 2.txt
Resource
win10-20230703-en
Behavioral task
behavioral18
Sample
BR_128.201.76.105_2023_06_27_00_34_21/history/Google Chrome_Profile 3.txt
Resource
win10-20230703-en
Behavioral task
behavioral19
Sample
BR_128.201.76.105_2023_06_27_00_34_21/history/Google Chrome_Profile 4.txt
Resource
win10-20230703-en
Behavioral task
behavioral20
Sample
BR_128.201.76.105_2023_06_27_00_34_21/system_info.txt
Resource
win10-20230703-en
Behavioral task
behavioral21
Sample
BR_128.201.79.83_2023_06_25_19_14_48/autofill/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral22
Sample
BR_128.201.79.83_2023_06_25_19_14_48/autofill/Google Chrome_Profile 1.txt
Resource
win10-20230703-en
Behavioral task
behavioral23
Sample
BR_128.201.79.83_2023_06_25_19_14_48/autofill/Microsoft Edge_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral24
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cc/Microsoft Edge_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral25
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookie_list.txt
Resource
win10-20230703-en
Behavioral task
behavioral26
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookies/Google Chrome_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral27
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookies/Google Chrome_Profile 1.txt
Resource
win10-20230703-en
Behavioral task
behavioral28
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookies/Google Chrome_Profile 2.txt
Resource
win10-20230703-en
Behavioral task
behavioral29
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookies/Google Chrome_Profile 3.txt
Resource
win10-20230703-en
Behavioral task
behavioral30
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookies/Microsoft Edge_Default.txt
Resource
win10-20230703-en
Behavioral task
behavioral31
Sample
BR_128.201.79.83_2023_06_25_19_14_48/cookies/Opera Stable.txt
Resource
win10-20230703-en
Behavioral task
behavioral32
Sample
BR_128.201.79.83_2023_06_25_19_14_48/history/Google Chrome_Profile 1.txt
Resource
win10-20230703-en
General
-
Target
7.5 - @LOGS_CENTER #4.rar
-
Size
274.7MB
-
MD5
ad83c830f323b13471bfa1a49fa4e8da
-
SHA1
563949c3052df30ac32b3628356f07a5b8908c43
-
SHA256
8ded9a82ff038ff7efdb0f26de3bf8c21a8b8864ea6af72321f27ac68a578a5b
-
SHA512
8dcadcde4c98f1c79eb9d4300c3018d4aa530d7c7880c8495fdf92bb2bc89dfff5b47922f8750bac3885b1c8e70440b1d8d68e876268e6dc7a3a5a45c8f31f51
-
SSDEEP
6291456:thK+Rna2PLUSGDZApcvpCRD8wRnzd+xGrU8vLmaOH:PVEEjG9RBsmZULjOH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 312 WerFault.exe 83 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions\Cached PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Internet Explorer\LowRegistry PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions PaintStudio.View.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix PaintStudio.View.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 312 PaintStudio.View.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3728 mspaint.exe 3728 mspaint.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 312 PaintStudio.View.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeShutdownPrivilege 4264 unregmp2.exe Token: SeCreatePagefilePrivilege 4264 unregmp2.exe Token: SeShutdownPrivilege 4908 wmplayer.exe Token: SeCreatePagefilePrivilege 4908 wmplayer.exe Token: SeDebugPrivilege 312 PaintStudio.View.exe Token: SeDebugPrivilege 312 PaintStudio.View.exe Token: SeDebugPrivilege 312 PaintStudio.View.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeCreatePagefilePrivilege 2992 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4908 wmplayer.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3728 mspaint.exe 312 PaintStudio.View.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2532 2376 wmplayer.exe 72 PID 2376 wrote to memory of 2532 2376 wmplayer.exe 72 PID 2376 wrote to memory of 2532 2376 wmplayer.exe 72 PID 2376 wrote to memory of 2896 2376 wmplayer.exe 73 PID 2376 wrote to memory of 2896 2376 wmplayer.exe 73 PID 2376 wrote to memory of 2896 2376 wmplayer.exe 73 PID 2896 wrote to memory of 4264 2896 unregmp2.exe 74 PID 2896 wrote to memory of 4264 2896 unregmp2.exe 74 PID 2532 wrote to memory of 4908 2532 setup_wm.exe 75 PID 2532 wrote to memory of 4908 2532 setup_wm.exe 75 PID 2532 wrote to memory of 4908 2532 setup_wm.exe 75 PID 2992 wrote to memory of 3996 2992 chrome.exe 92 PID 2992 wrote to memory of 3996 2992 chrome.exe 92 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 4900 2992 chrome.exe 98 PID 2992 wrote to memory of 3268 2992 chrome.exe 94 PID 2992 wrote to memory of 3268 2992 chrome.exe 94 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97 PID 2992 wrote to memory of 900 2992 chrome.exe 97
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7.5 - @LOGS_CENTER #4.rar"1⤵PID:4448
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play C:\Users\Admin\Desktop\SyncGet.mpeg3⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4908
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
- Drops file in Windows directory
PID:832
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\SetReset.jpg" /ForceBootstrapPaint3D1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3728
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:312 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 312 -s 40002⤵
- Program crash
PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9b4f09758,0x7ff9b4f09768,0x7ff9b4f097782⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:82⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:22⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4392 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:82⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4540 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3688 --field-trial-handle=1500,i,598478243293179684,15768162598933783537,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5262b7f225eb3d64f49f174ed3ac8aa64
SHA1c46d8f65a851bd5279fc79380b8f00eed0b55406
SHA256a09f496b117e1fabb09ca69c8585c1417bf28f6874b03126535a17dac7962463
SHA5123eafe25b8a33a36d10f87fcf4c850e45aaad5d9d7c32cdca0413b683aacd59e40a1a01ce10add59f84af078a2afb7f44eea25928590d4911d940c7d496d8f1bb
-
Filesize
1KB
MD57ef7f33b71cf5f34363a12cdf809fda8
SHA1c8fd8d4c112ac8baf7820079aea9e3621227ec4f
SHA256bc060803937833af3df36987566fa6c8db6cfd89ae9077e2af58921c92455007
SHA512de153c9f72952796cd3256e25103613a8fa3abaa86d4b13eb14dd5b18aa0c18d1dab92823d212e3856c7753a889b9e28b56dd0da27aa5db23b64e1b9685b494f
-
Filesize
539B
MD5906284eb1ef36649f0ed964442478de7
SHA1f3191b9f6bcc4eb1382b5e8f577c4e6232100565
SHA2564f1753d52bfa2991027c2ddfffce3c629397050968e66dc711503d83591edbce
SHA51277dbdc274f5e866a8fd005108843100b246b8dc69d3a661a1faab00bb91c676af3bbf54aa32e95909b1f3811a483b4f01b279e36a4efb942a984bccf64e2ab26
-
Filesize
5KB
MD5571c2eed5266579436b4912cbc7aaaed
SHA1a83cd2001450998c94eb1a05e5c1675b85d6c27e
SHA256abc0f525ef1298dec508737a6e7e3f3740805b2c548763bad9cb40aaeb55f3e1
SHA512896df0fdc4e718b4ae7a00d1894d5f4fb517566642e367af7f556cef4e53d76f10053877163228ff5bc2ad78721195dbf43286cb47544d3dbb2eb3cc31ca3deb
-
Filesize
5KB
MD5bab1bd3c6d1cdc141f18f80c0a9e002d
SHA1c49a051d4e0f291ccacabe10484590ba9a9586d0
SHA256790970c0fb55bf552b3ea9424de39ec70ab78dcce86bf6187ffb1bb326277094
SHA51257856f92102d0cf91c395780e628b534831750fa62cfc2c7d3960ace7773ca4ff5597497a515ca1849e531d053bed5377305e60e9a076b5db6e60319bbfd0db9
-
Filesize
177KB
MD56f7dcd6a364a37481aefff591a8243e7
SHA1669b696481a01de28ce22d79cf573e4550911f77
SHA256ad28b1e94fa931111c63784eff3385e26a90f55827388603ace8c9977548c7b4
SHA5122905774475dfb35dc3b63368f5255eae9513aeffa40dbfebfaf4ed533121d555c15341bcbdd8a7806f588efd94932a661c324cc1a91a1955c8b8ed5acedcd158
-
Filesize
177KB
MD5557172282356ccf5f41be3e2e8df964b
SHA16d59f78724058d6a8d973496c8452ea735ff69f3
SHA25676c0f71f461027eecb2f3512d191dbc8f434007c7c513c413db543bae2de2151
SHA5125781f1967a54e0fd85fc81d7bdd8bcac734f16a68ee4d4b8ebabecf2857f71975e73db41186ef59df85a68540f3accab3f6ed0476b5979534c7f696178a4f5a1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
64KB
MD598df921f667bf303621c789390ed9f2e
SHA1d9c82e51534cf1c2eb5a255286de6a09ca364d1a
SHA2568b8497d37fa9ddd44e275aa7631d7c7173c384a501d11e73e3d4401513c4bbe3
SHA51258e896295763c2729c5a19986356e7cc7706265bbda5cd9cec98201ec9ce86c4b68a3e388c86aba198870ca4b8ab1a7876f2d8e1fff7437216dd2789b3ed3796
-
Filesize
1024KB
MD5db768e865df4d433636ea1cfdaa2ca82
SHA1ce2e13a04a5dc3ba99d49a0d55f481545274de6e
SHA25687340b742128d2f260dadbeef59c78c8af70125ca70445c4210876c0e24afece
SHA51234d3a81587271086385cd24382ca9e309c482bc2676e69f35bbcd0e3cce2b206de2e0b0d242cc3b622f65dc4c8a05c61a18329dfbb955e7234fdc495696747da
-
Filesize
68KB
MD5256d146f3c1918cad1d594b1666a4168
SHA1752f0d64d507dca46f3fc17b5329e002280af937
SHA2569b5e15a4c9c9ba88e6ea4f091af4d106d964936244e524efb0c7f0ef869c29c6
SHA5125ffcd903a4b142a8e246b16874bd7a75f6255f55802141d2109adb51fc7c39222ad10b155900e3401eed60c169f10a9919e94f6686a8654593910ab0485adaf1
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json
Filesize2KB
MD5404a3ec24e3ebf45be65e77f75990825
SHA11e05647cf0a74cedfdeabfa3e8ee33b919780a61
SHA256cc45905af3aaa62601a69c748a06a2fa48eca3b28d44d8ec18764a7e8e4c3da2
SHA512a55382b72267375821b0a229d3529ed54cef0f295f550d1e95661bafccec606aa1cd72e059d37d78e7d2927ae72e2919941251d233152f5eeb32ffdfc96023e5
-
Filesize
546B
MD5df03e65b8e082f24dab09c57bc9c6241
SHA16b0dacbf38744c9a381830e6a5dc4c71bd7cedbf
SHA256155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba
SHA512ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99
-
Filesize
523B
MD5d58da90d6dc51f97cb84dfbffe2b2300
SHA15f86b06b992a3146cb698a99932ead57a5ec4666
SHA25693acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad
SHA5127f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636
-
Filesize
1KB
MD508f66617ed5eea8b3507dea6e0f4c99a
SHA1872cfc13ce31712c6acaade9b1ede9ea19a1231a
SHA25687a807437608870cf8192ce2da7b13ce057477dd07f7c5d9390f2cb5abc9d862
SHA512ba05b85e26a04c13c05ea4f790346452698c7dbf334a86b57fa302c68cfbe1db4fd4524653f17d4b30316722db32c5608b4f1d43c9886f6fc3480ebb7cc85492
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD5cb1d20dca36b755dcf0c270136afdf78
SHA11d4db13324f297abac417b81d638d629755cc42e
SHA256cb31fd0bd43ecacdf1609214dcd55d11234f1705bf7d8aaee1f095b9a9690440
SHA512d192b81693c5d30c780e67b62deaa6717044dd6c242a9236f73f7c8386820177a12c084223c7dfc33f384c5f6007097ea61963d5b93d552b5572ebff2bf56285
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5a552a9ea297412a35b443af7f689cdee
SHA16938314f14ed99d390d37efe281dc115c5aa427b
SHA256f21196a3356a4f155ffb7bbb34ce315ebaf918230638d62288a09d33a3d494ea
SHA512b157c1e647a48047e6aee63e1993df44ae32b1ecc183127fd24cdd5e45e3f8368279ac987eb0b8ee22a0983d8feb1d7432ae9caacb6d81f0c4d3c512e55fe9b5