Analysis
-
max time kernel
600s -
max time network
598s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2023 20:42
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Drops startup file 8 IoCs
Processes:
Invoice No 88404.batInvoice No 88404.batInvoice No 88404.batInvoice No 88404.batdescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe Invoice No 88404.bat -
Executes dropped EXE 4 IoCs
Processes:
qrpgxvfk.exeqrpgxvfk.exeqrpgxvfk.exeqrpgxvfk.exepid Process 3764 qrpgxvfk.exe 4012 qrpgxvfk.exe 788 qrpgxvfk.exe 3360 qrpgxvfk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid Process 4196 taskkill.exe 4808 taskkill.exe 408 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133349641759871279" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exechrome.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1420546310-613437930-2990200354-1000\{BFA2DC8F-EA3B-4040-B2CA-41318A15A457} chrome.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
Invoice No 88404.batqrpgxvfk.exeInvoice No 88404.batqrpgxvfk.exeInvoice No 88404.batqrpgxvfk.exeInvoice No 88404.batqrpgxvfk.exepid Process 4680 Invoice No 88404.bat 4680 Invoice No 88404.bat 4680 Invoice No 88404.bat 3764 qrpgxvfk.exe 3764 qrpgxvfk.exe 3764 qrpgxvfk.exe 1476 Invoice No 88404.bat 1476 Invoice No 88404.bat 1476 Invoice No 88404.bat 4012 qrpgxvfk.exe 4012 qrpgxvfk.exe 4012 qrpgxvfk.exe 396 Invoice No 88404.bat 396 Invoice No 88404.bat 396 Invoice No 88404.bat 788 qrpgxvfk.exe 788 qrpgxvfk.exe 788 qrpgxvfk.exe 4920 Invoice No 88404.bat 4920 Invoice No 88404.bat 4920 Invoice No 88404.bat 3360 qrpgxvfk.exe 3360 qrpgxvfk.exe 3360 qrpgxvfk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 3132 wrote to memory of 4568 3132 chrome.exe 53 PID 3132 wrote to memory of 4568 3132 chrome.exe 53 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 2804 3132 chrome.exe 87 PID 3132 wrote to memory of 4944 3132 chrome.exe 88 PID 3132 wrote to memory of 4944 3132 chrome.exe 88 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89 PID 3132 wrote to memory of 4504 3132 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/s/ou3xkgkz9fs49cv/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff923f59758,0x7ff923f59768,0x7ff923f597782⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:22⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵
- Modifies registry class
PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4956 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3976 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4748 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:212
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:4680 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:752
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im qrpgxvfk.exe /f2⤵
- Kills process with taskkill
PID:4196
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:396 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im qrpgxvfk.exe /f2⤵
- Kills process with taskkill
PID:4808
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:4920 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im qrpgxvfk.exe /f2⤵
- Kills process with taskkill
PID:408
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\27621829-4144-442b-8452-39763355e22a.tmp
Filesize6KB
MD5debd4ae7c322d3b51d7586b4bfc6a07b
SHA1bbf1c3b5b27015f948ed7f5fe109a57e3fb2605e
SHA256703502fc97968f3aa5c36f455a46fbe553fae6012b346004d039bb96e5b44a23
SHA512ba6ae32734dfd29694975a468d80cc36ea32d7ccfac0c7aa9916b54f9e941a7b16384509d4049599f165c24492ef32b421b40993ffe673f8deb83ab8d62f166f
-
Filesize
3KB
MD53846da813122cbeaa9d6f199c6a7c6f0
SHA14b2aad6e118fefb749b4f0bba8aa3efb350126b7
SHA256cc15cb1e07bad4deeb3c1bd0bd45ec0ff9062060c8d0c61111a65a4d2d6fdb8f
SHA51246a8559dbfd3c3e97d88af52f3fbb790376d82a5d71dcf8bfe55ee5f46fc0071365f0fdf03078ffd08be98af9c728a983245c15d0a9bfdb478365e0db8eae196
-
Filesize
2KB
MD5fd9765086a1f0ddd5d504ed69967b974
SHA15e5855cee3341dcd78e0c22ae08f09303d46bd98
SHA256717466c22606c45468c7e582e779aeece2cff33269fc67529d1d0e45634175a2
SHA51210a9a7c2ab41948336393a38f5b9ddadb934e9d8fdcb0e0b63c539ed31bc0679c2523372848453a3f9b770bb979a56f69ea36038fc912dc27bd7d44ceb2dccfb
-
Filesize
2KB
MD5835f6122321d252b9fd0f9b188828a7f
SHA1c441faf4adae5d58a09eab5d93d806d456726871
SHA256e63d2538a3f108b0d784bd84e39046254704b19791562ec3132b002d9f37547d
SHA512e47484ce7308d029ff07892ab5657f32a5ccd0f199f42b8d35a0021cb3c3d6218eb07dc17798bc8f2cf974f967b85260b88c97d04ef8220f5f93f399920d31e0
-
Filesize
2KB
MD53be121f1f0d377deb7bb5a1c1b661a31
SHA15195c26e4eb143d21d86538c7e5d418e18ba527c
SHA256a04372038b42f78d82553848e82f480c01fa5033307695db8ead875a10c13407
SHA51214c1eb0998c8eeb44120bd041f1ec17ffc976dfd5fe3d58dc301bb54b8c0c960bc3a808f32f0d2a8121ead7dd04e6aa37cd6389d1449787b93415ff90e3deb2f
-
Filesize
1KB
MD5038adf0ec9499973b498eef1c08f1fb9
SHA1e39b207dcbbc633fcab2a99ca046f19db7d0bfd6
SHA2563aa3adb501efa1872b9370a36da54a871ed5d76d0764f81722c41eb8c74d2440
SHA5128e9494a97773cf5f41ae1eadc23c30e6a17ca10f053b28239eee24f871b8a338610fc24e792b465008d6aa40991ee35d8160e0ba34c8b8401f05bc00aecbe69d
-
Filesize
1KB
MD517b630cff865b15de38d5d0cbcbac669
SHA125f953f21ca46deb413d4b845b1484eac074fa7d
SHA256b025a381ae299d6fd463bcbfc8b21e33b52d4a68b3feae7840c56608b2a76cdc
SHA512f98781b1c7b9829c1e2188de57bf62dc85b4293fdda4fa2aee77bb688f14b6831a1f0e4c1f8b53847ee78eb8f329577ea5006435c1567dea8b8bd5c90d64bf4e
-
Filesize
1KB
MD503e8e540d08b97d831733ff28b5ebb60
SHA1947441f24e35f4255db9b4fb70916e2fb78083e7
SHA256af8f185c9e2d76150bd7f76d2b133c51a97df0879bee3cda85394176825a3915
SHA512c233f9a1caba86fd8bfed5b2c94b53f99b8946b811d94541dd2ae2fa6519c6e88b0ab2f04440900e401ffde0b03c4775f67e8dc80464de587c548a32f9a624c7
-
Filesize
1KB
MD51492e2424c41cb630013c6235621a529
SHA1e67378341e41994398b8f3bd505992644d247234
SHA2569f466a186c6797b606ed93fb32b4de4c57d58367ee99bd1642d338f2427883e2
SHA51279731aec86017646606f3caa7c51ec4203ab58a11b10c34deafbdc20917492b34296b4347853a38e3be1fc4350871afb7697bbc412db37955156684e06ce89c7
-
Filesize
1KB
MD5332affa51bff4495f09c6c7a8278a6bc
SHA11a962706e10de6c465ed15a3c86994165f51ccc5
SHA2560400343d942a6c492676857494ebba1d34b74753e12be91a0b4c9177f84590d5
SHA512119a4a16ed46ab214378004923858f405f2366bd73f28180eb58300ddd64a0c920b163d007a63ad4b7db3bd1363443d9118fab5c26f572e241080d865f4d3f5d
-
Filesize
1KB
MD5c5704522aa5c7673efd63370ced62c78
SHA15733679ab42fc2f6c2ec257548b66cd2fd46dc58
SHA256b1310d90cb022774391e42f7701e0b6f43692baf2acfdf2aed08c5869cbadc6d
SHA512ac6c55e9fb12e389c8eff8d160368fc739ccce6fedf05b74664a703a4f4e4a3279cd2a0bbde99e6a970e27558732ed83c9c655244fd286e413ce2d1f63aa47ac
-
Filesize
1KB
MD570dd6dbd07bd487a66afdf44c515be57
SHA1ac416ad64ae0ec8e3b41ca8172bde2eb39d6a7c0
SHA256ca305183e3154aa63f796b0301ff69651904009ea843292cacb742ab10079394
SHA512a4f2eb05e8ad243bd5f278cba57e86e41374282ee74748c2cbe4cfa81fd6ee61464a14c3773d029e4dba1fddad74191cefd09c930f3032b014bd89075711902d
-
Filesize
1KB
MD518b7356da6be4b0a6065d94ebd055e66
SHA1d32df9b18b5bb4e8e6fa3b81ad1aa0bad71ca111
SHA2566da8c836fca03fc0b4dd4c04a280aae20f1e0aa086f2bacd726e249a17c5a430
SHA51279c25e8705ce67cb31c85948cecc02522c938974af02683d4e6814d9b9d5a5ffafed23e9082915238b829041cb1f40d50ad53b4ee329a8e835e3493823a9beb9
-
Filesize
1KB
MD5867d1d65f38bbd25a85c7d2dae1926bc
SHA1725de1699cf591b10d454176415e023cfc3e9aaa
SHA256cc2786ed342880bdb81901e0bdf77f93ed5e27e65e0eba862b1480bc1ef8c025
SHA512ede2baf6dc4eb6d040853eb23fda39749300dfe0bdfe60a2c0ebd92009c6e236f07a0428a6c2b4e4edc83760da1dfaaa7d2d2e325030ae69a3f4d94f69585c69
-
Filesize
1KB
MD59bacdb700295c644f2e27e55b4c49a02
SHA12fc0e15843ff1179cf5e94764e55e8377c86fdb6
SHA256234ca4ef16455ba0105fd8bcd5bd1df5532697ed2ce871e96e48e0e927edec02
SHA51206a68ff710393effafd6d074003b237fd4e5dc73dfcd8bcde702ca466cf4caf24c652703034cf923dc993ed0444e230da19022dec31533f92596d2672bf9e621
-
Filesize
1KB
MD58682e142e6782e454793d0f381cadcb8
SHA160a1b34818aa51b6998e89206c9993df1db92c2d
SHA25632edb14f80ab31ff25c27a76da6a6e25d2dd3732a6f43b9103953ba141f0cf92
SHA5121dc05a354e7149a685479101020913835e10ff2daa9fd979d5b6dff47aa944dd1359c82568225b61211319f4e9e8f48395e1156d73766ff0bdcb8e535699f062
-
Filesize
1KB
MD56365e14271b510aa8e6dce700f6d4a5c
SHA1f10b2f4305150f347cc797340d71ce2e7b15cf21
SHA256d1b957a92356a2de3870f3993e6c7a679168868bfc1a6ac98a9eef1359baa26d
SHA512bf51721db9e4be6df98cd08ef7977283cfd187008095d10651ac6f95ab7324d9c7d8a42d06f00002e4342108d3eeecaa3c792ba35244c04e93f141dbda37bf98
-
Filesize
1KB
MD5fb207b6cc360b5f6da523a1a02c71bf8
SHA1adb8854c95d3a1d2a0bee318fae67d3dc1310402
SHA2560015a0573ea8dcee895d378f0f641ae888a7304118f60333cd030e4791191e54
SHA51213fb23f490f6940b2a3f814794d4b9c491bf9a1d2774d3eb93f0205c11be50f9a135f8f14f69eff362b9ca9eaf966260e6b36dba7b3f19e2ef9d64d1650a897b
-
Filesize
1KB
MD5b9ccc1321b272122822fe00cecb78d70
SHA1a64aea3d023b8ac24f9ddfd17aa88781c058109c
SHA256f3169f6e645c842ca2824a3141590e908ca818c62e99428449dba4570e803201
SHA512a7dbe3a3aa9347619e450efde5863545d4549b784705dd85a4cd97a3e2b50829872d5d43507a0cda8fc1313b788412f94ed539fa96879468118913614cf3167f
-
Filesize
1KB
MD52ddd5f2385bb39a049d085efd273da85
SHA13ebb58f1a8ed4ab6acea7eb512fc3ae9ef0cbad0
SHA2565bc828a9f24dc4779b6e44248a355480f8ec0ea922da36501a7c1a430b75883d
SHA5121689a3ed3c3b5da5e1fdbf875abdbe19cf67f90a1a3871b7f3c4ac65873c9c4cac64c2a4ec3f94610a4febaee8b4975634c908163fd0aab5a3828ffb711d5d8d
-
Filesize
6KB
MD56ec211724306e73353bbe415c4982584
SHA1dc09fc4e92506a92d8a98f9024de48f183d5699a
SHA2564ebf141704a7aa26448446682994ca53c09afd34eef8cb771c6a576f07e786c9
SHA5127060d3119876fe9f08d8f246559e73770a64960c876d75293fc9843c5c947a6ea132e86d24b344824155449626ab8f5ddb0dd3013aec0cd69e3491754ea75731
-
Filesize
89KB
MD5ed601a1be16ba09acfb3e37316d2f7bb
SHA1f1ae54f7bb5a46e157130a52108fbb42a7ce1d78
SHA2569ae7a43dc705c9933edfebca0734f07ac2408535588e2008535d27705a8dfe88
SHA512ba02ad19191b6946629705c72d06833b8da9377d8464de4218903cb88ee31adbf086065f67397d1e9e321fa221d55861debac9449375ad9dac58d0ada079d897
-
Filesize
89KB
MD57a0f16cd9adde4b92b0fa784491d09aa
SHA16134c87e786f34756e3b60d4e7bd2e6313b5b090
SHA2560804b74da1587df37ca01de4f67048ddabc36462c8c58835f711ff1120a5d175
SHA51238093e179c32ea6922ab83be37203898c1f4a8bc707d5fcffd6a13accc325c8d94eefb62addd6ffe6c11732b0f3a8d4ebdaa5de36bc601e5fae788c9191ab77a
-
Filesize
108KB
MD507fcdd1f6a30fc90d17ca1dc63341bd1
SHA1a916e54171aca08720afd3d360062d4379e4aede
SHA25634bd40723eb6096ae40e02c6bd65dfa1839c0335d4f836392a58f7118c1a28c7
SHA5123eb9611c9eb7ddfc63d90ca1df3306810159fd068913ac47910fe2cdf42798de155396d38ce40c5596adc1ab151dfeadd3c0e394479a518b2c47f3e0b5dc6425
-
Filesize
89KB
MD537202bd62b39d83fdb3c26b507d79e84
SHA13910bf1578bc15b1c3076655429ab53162eaff84
SHA2566c6e8579840067246924bacff45ef92e604876dbafa1a7d412c4ffecf9a53677
SHA512102157477d0e5fed1ce2921c740351134e7612b37441568403d4892071a17d15a8b441e0e6735fa44d91a47669d232aa64ac85d3453db7a94a915348667f3075
-
Filesize
113KB
MD5ad598313941d3463c69eaf64d09586aa
SHA163246e39b5f41824e0acf1373d21bccb2a91cbbb
SHA256cdc4e322293558762f87af4d1a4051fa8743a5c90f56c749522ffe17404ee1ba
SHA512ac89bd8577bf523ea22ab83e8393e9ef3a27ad6a54c0471e2690db5cf5ffbf2ce8a9b923354020aff70e5e7cb8fe88cd9863c1ad8b6a0fdf0cfd308d47fb48cf
-
Filesize
110KB
MD5954250f5747df8035c566e3553fcfbb1
SHA1da62f109e59292f02ce79a694215240b57727117
SHA25635c9a4832bea4ccbb3d19a06640031b1a0d8e6f6be1e2e573e9350d19d068580
SHA5121ef96f9cf66a04e139a4af76f0b5f124c975cec8f292703425bb261a3e19e90cdc85ed2905bf0402375def7714bbb8d6afa4ad9ac06f5fa37e3dc948ba5a6dbe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.9MB
MD5560f4049a77df65858b292169dcfc4e7
SHA1d57078d853074841f38b864e7890d4c2839cf089
SHA2567999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe
SHA512db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7
-
Filesize
2.4MB
MD5dbe37e700e7f1424e255629e453bacf1
SHA12f3c21c26d3faaaf5ea96fb710d2108800cb9efa
SHA256f29a29a81edfdea36ece02fa5b22ff4ab6c4b5ab03f8295fd7dacf5464554100
SHA5128e13b824b40b2cc97d22ef2d89c71ee7b1012f7034cdf88edaf2f86cc6e2a5c46d44376712845fc27e92e3ab922f159bf460e16bc857c76364481b36eb670bb6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e