Analysis
-
max time kernel
251s -
max time network
252s -
platform
windows10-1703_x64 -
resource
win10-20230703-es -
resource tags
arch:x64arch:x86image:win10-20230703-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
20/07/2023, 12:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1091442373747294208/1105586374624677908/SMM_WE_4.0.0_Beta_PC.zip
Resource
win10-20230703-es
General
-
Target
https://cdn.discordapp.com/attachments/1091442373747294208/1105586374624677908/SMM_WE_4.0.0_Beta_PC.zip
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\msmouse.PNF SMM_WE.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343290476604912" chrome.exe -
Modifies registry class 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\ = "URL:Run game 699637175360421948 protocol" SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\shell\open SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\DefaultIcon SMM_WE.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\Nueva carpeta\\SMM_WE_4.0.0_Beta_PC\\SMM_WE 4.0.0 Beta PC\\SMM_WE.exe" SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\shell\open\command SMM_WE.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\shell\open\command\ = "C:\\Users\\Admin\\Desktop\\Nueva carpeta\\SMM_WE_4.0.0_Beta_PC\\SMM_WE 4.0.0 Beta PC\\SMM_WE.exe" SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\Local Settings chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\URL Protocol SMM_WE.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\Nueva carpeta\\SMM_WE_4.0.0_Beta_PC\\SMM_WE 4.0.0 Beta PC\\SMM_WE.exe" SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\shell\open\command SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948 SMM_WE.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\URL Protocol SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948 SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\DefaultIcon SMM_WE.exe Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\shell SMM_WE.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\shell\open\command\ = "C:\\Users\\Admin\\Desktop\\Nueva carpeta\\SMM_WE_4.0.0_Beta_PC\\SMM_WE 4.0.0 Beta PC\\SMM_WE.exe" SMM_WE.exe Set value (str) \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\discord-699637175360421948\ = "URL:Run game 699637175360421948 protocol" SMM_WE.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 3760 chrome.exe 3760 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4312 SMM_WE.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 4832 7zG.exe 3952 SMM_WE.exe 4312 SMM_WE.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4312 SMM_WE.exe 3952 SMM_WE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2884 2660 chrome.exe 70 PID 2660 wrote to memory of 2884 2660 chrome.exe 70 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 312 2660 chrome.exe 72 PID 2660 wrote to memory of 660 2660 chrome.exe 73 PID 2660 wrote to memory of 660 2660 chrome.exe 73 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74 PID 2660 wrote to memory of 4388 2660 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1091442373747294208/1105586374624677908/SMM_WE_4.0.0_Beta_PC.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbfdad9758,0x7ffbfdad9768,0x7ffbfdad97782⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:22⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:12⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 --field-trial-handle=1736,i,11660794156789759511,1909113365197238845,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3760
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4992
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" t -an -ai#7zMap24777:126:7zEvent318291⤵
- Suspicious use of FindShellTrayWindow
PID:4832
-
C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe"C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4312
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d01⤵PID:4052
-
C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe"C:\Users\Admin\Desktop\Nueva carpeta\SMM_WE_4.0.0_Beta_PC\SMM_WE 4.0.0 Beta PC\SMM_WE.exe"1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD540331372dd99cbbc47adbc5892da7eca
SHA166c1571dd27fdb013d676d944b2b771317f15caf
SHA25688e38aae0080a05af7142fb04028077f26c4ae790fcbd85035697a843f84c117
SHA51202b322f1c01a11303b76317521bc4729c6496e26519a76851091e2103a9242576c69d9889e2129f7e7b1d483600134723528d0ea2d25cceb5b083e7aa3c68c9a
-
Filesize
1KB
MD594dca48e60d13128e088187173178a8d
SHA10f590be28cf139f10a60a166ac28830e229d4059
SHA2563fcf9d63df57052e7aa190300f52f7cb9cee0f3c626ac18218023c742acbc76f
SHA5127642b1820a80622bf6a1187339149891bec023f018b6b46372731c7286dd51ea809c259c487997fcb0acac86b9534d4f2bf83179e0eabe60b3c10004279c953d
-
Filesize
5KB
MD56780b06bafa646cd250f24808c164a8b
SHA18220131bf4bc6b2e51b807302ea6194cfd6d12be
SHA25640395e811bd7df4db29e00ec78d12adb64dfdab0ab7eea45603afd2f1051ac46
SHA5128a1b643704b4fc3915e79d1ff5381885ebc8cedcfafa1ee91f0376de9d9ea0459faee0afb524f5409d1c33493f10d643d4d1a4d0917214a7179ac31cfdf72bf3
-
Filesize
5KB
MD569b9ba7fa0da454346404b42609f6712
SHA1acfa48140e65a5afec124c4b0673b9537fd9624e
SHA2569544ffac3c41190827b913d884024acf509fa08b15af8800445ecc3838781cef
SHA51290e9202a2669383d9973ab396f88073a10496062390cac6f0cd09f3fd6fc905e435f43f18f0de3833b0f66bdaa4db5ab968e64038c8b78577f879941b1cd3562
-
Filesize
5KB
MD5b96a3e63a2d3a74bc62adbe97dedf57b
SHA13c5465168a26dd0208f834621f8540b4367a0334
SHA2561a5171307bdb2af091feb5f74737082fe8584760064742a7851ef944b0338b89
SHA51249d60a509232cfed7fbcb1d8fe4af02ea457881e7694b5ca848af83591bcf2c98d1619a3c00a7252d246b1725509d1dcb64c0010dbb4e7526b3b748c5c538445
-
Filesize
5KB
MD5a5372796af8dc577159fcc279e8ec081
SHA1291aa289118d2f8af33de2ecd44966a73486ad19
SHA25687f66c83d4c39abf81015d57e4b213ccf7ee829a532c257358cde4231e1fd1c8
SHA5123dc220f9d2c260f800c73b0fbdb0f6832284efc4250fc0151a1633c3128bb0acb775d9257d5d1532cc7ccfc0778e4bbb611386c858d2dbf268c6ae63a7208722
-
Filesize
5KB
MD585e7f861aee95c3c8cf9891a4c6ee5c6
SHA15153a5b978ffe07673ec657e166087db32781063
SHA25631b3aef0cbc19a6e6df914f94c054025c44cea3331894abab52d4fd0fe7a5026
SHA5126f18132aebc6f29840826628a27ce9212763bb9149417798951a3f52d09ca2c7b071cee52823b6500819381ef45cd1627fda0980b2dd3174d6636161313abb79
-
Filesize
87KB
MD52aec43e80fbb0b5c3f2111482a4c611b
SHA15ca324c015a2619ece6df11be9015adfb9481b52
SHA25613fe5185c9564e934541534c947ad371baaf7a99bb637125667983207250881b
SHA512fe339c1304722f7e5fe93932ff14116b170deeae091cbf6c442d438ab3e6f02d138d70236548ea949e48d5e4e3e3af1ee6293783d7948d035fb37c3713fb9462
-
Filesize
105KB
MD508f89e4aeb2e7f9407a45bff5a8f249a
SHA195a201f8f455132bba290ce2513d572c2fbd636c
SHA256af21c598d35144b3590ff9b015f98fdfe777cf6be1360a339f0efcaaaeb7dde8
SHA51296f0194f55bcfea8dfc7d0fbb451cc3224eb8ae86bc16763da863a51450b022a0fcb15c1c2ff66be820963ac36dafee0e48a0ca055e40e21b747638b78d87647
-
Filesize
102KB
MD531f000b671d62229c45e5ea7c89cf541
SHA1328b4b0992aad00ad9b97fa5bfff6f75059680d6
SHA256ae3784cdb6411baaaa199f89ffdd114f8922cd2d1d14aed94cd8aa849f32fc62
SHA5128163ce4f07b342c9ea6dc2c663e235b63204e28e66de48c2d0c44f3e7b5eef875012f7f42626ea8ca4a8c565f613c601ac2517429120a9bcd540ae236c576d04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
72B
MD5a2567f3687aaef1777b55c519935b9df
SHA1efe71f441b81406f8696fa963cd33f3d42bf8cb7
SHA256ccd486102a58b0bd1fc39c21173241899a303e15dfc487cec6dbd4566148b73e
SHA5126a972973da560bccadfa11ce7fd4b9debe794ec0884a85e07cb5b806665d4f3ae80fb19bbe0a301ed89b52501d98516df010ca9206470c6f51bd4ba5a9e567f5
-
Filesize
141.8MB
MD5da4bc8264b1994f44082416db1df74af
SHA1cc577ece22ec093c47ecf2a1506e56f859e0d6ad
SHA256a19b1dce0887f204dce9fdaad9220fedfcdf1e39b5b9d07a8ee9e277ae47cb38
SHA5127275b1047ac463ec885d4b101072bff9833c17730f60dd6c863e36eab81b4ead397773bdec3545bab8e8a85dd2dbe685dd6ddd23e2c54ff8db18f68b22f49f57
-
Filesize
94KB
MD5b88d3cab65777afdf9d9c7b8cb190cea
SHA1435ef6f0ec97f975660b72626a5df4fcd523d47e
SHA2569001f3496061971ea79442afd59925ddba3ede734cbb6fa10970d510e547b707
SHA512f8983babc6158fad96d0c30e2c476e562e50e4e34ed890e1eea9f4a6d17b044349a7a1ddc0f993068ccd3f75ec614ec7796883616010a73e30728c012b1b686f