Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1801s -
max time network
1803s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
111111.txt
Resource
win10v2004-20230703-en
General
-
Target
111111.txt
-
Size
546B
-
MD5
d4667a61452845f6dab7acf2279fd0ea
-
SHA1
ba1a35c9504828fde90bc250f5a05b5895830d9d
-
SHA256
5920ce29a0429c40ba97fcf59ebbf77d87296d22e769cd4720d0b4d34963057c
-
SHA512
3555aa8207fad9569735051415f74e6d76e71be70f6962ff1f935a551cd7a9ddd7a42e8e2bb856d62bad3bc2de7ee8cf22c19db4a471f46d4b829a51c3933c03
Malware Config
Signatures
-
Blocklisted process makes network request 64 IoCs
flow pid Process 92 3712 powershell.exe 97 2828 powershell.exe 99 2828 powershell.exe 100 2828 powershell.exe 101 2828 powershell.exe 102 2828 powershell.exe 104 2828 powershell.exe 105 2828 powershell.exe 106 2828 powershell.exe 107 2828 powershell.exe 108 2828 powershell.exe 109 2828 powershell.exe 110 2828 powershell.exe 111 2828 powershell.exe 112 2828 powershell.exe 113 2828 powershell.exe 114 2828 powershell.exe 115 2828 powershell.exe 116 2828 powershell.exe 117 2828 powershell.exe 118 2828 powershell.exe 119 2828 powershell.exe 120 2828 powershell.exe 121 2828 powershell.exe 123 2828 powershell.exe 124 2828 powershell.exe 125 2828 powershell.exe 126 2828 powershell.exe 127 2828 powershell.exe 129 2828 powershell.exe 130 2828 powershell.exe 131 2828 powershell.exe 132 2828 powershell.exe 133 2828 powershell.exe 134 2828 powershell.exe 135 2828 powershell.exe 136 2828 powershell.exe 137 2828 powershell.exe 138 2828 powershell.exe 139 2828 powershell.exe 140 2828 powershell.exe 141 2828 powershell.exe 142 2828 powershell.exe 143 2828 powershell.exe 144 2828 powershell.exe 145 2828 powershell.exe 146 2828 powershell.exe 148 2828 powershell.exe 149 2828 powershell.exe 150 2828 powershell.exe 151 2828 powershell.exe 152 2828 powershell.exe 154 2828 powershell.exe 155 2828 powershell.exe 156 2828 powershell.exe 157 2828 powershell.exe 158 2828 powershell.exe 159 2828 powershell.exe 160 2828 powershell.exe 161 2828 powershell.exe 162 2828 powershell.exe 163 2828 powershell.exe 164 2828 powershell.exe 165 2828 powershell.exe -
Downloads MZ/PE file
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe File opened for modification C:\Windows\system32\eventvwr.msc mmc.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3516 tasklist.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133359833836155963" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4428 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2100 chrome.exe 2100 chrome.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 1844 chrome.exe 1844 chrome.exe 2828 powershell.exe 2828 powershell.exe 3988 powershell.exe 3988 powershell.exe 396 powershell.exe 396 powershell.exe 396 powershell.exe 5112 powershell.exe 5112 powershell.exe 5112 powershell.exe 4856 powershell.exe 4856 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4056 mmc.exe 2248 mmc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe Token: SeShutdownPrivilege 2100 chrome.exe Token: SeCreatePagefilePrivilege 2100 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe 2100 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4056 mmc.exe 4056 mmc.exe 2248 mmc.exe 2248 mmc.exe 2248 mmc.exe 2248 mmc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3796 2100 chrome.exe 85 PID 2100 wrote to memory of 3796 2100 chrome.exe 85 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 4144 2100 chrome.exe 87 PID 2100 wrote to memory of 1960 2100 chrome.exe 88 PID 2100 wrote to memory of 1960 2100 chrome.exe 88 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89 PID 2100 wrote to memory of 5024 2100 chrome.exe 89
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\111111.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0x9c,0x128,0x7ffc45889758,0x7ffc45889768,0x7ffc458897782⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:22⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:12⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4472 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:12⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4812 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4900 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=960 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4684 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:12⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1876,i,9521038762366873445,6991761721354388965,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1520
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1128
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3712 -
C:\Windows\system32\print.exe"C:\Windows\system32\print.exe" c2⤵PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -wi hi2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4056
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2248
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\system32\tasklist.exe"C:\Windows\system32\tasklist.exe"2⤵
- Enumerates processes with tasklist
PID:3516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD53a8f08d1d1c3c84a187a9e861a25ea1a
SHA13f26fcc6035fb6a685ec4901021606ec8a2e74ee
SHA2564e1526166f66bb86663db75949349a89732b60e2385986284cf9fccbf689acb2
SHA51294f04498aad5dd5d595996f749781a65a86c5cfede5bc47c2185e1d4740c522443e59afd21c692c6c17cca07f8a0015306d4202691f314c66e8a0d55b2a4d490
-
Filesize
1KB
MD5f530dd0e521189c0df87dce7e20986bb
SHA1e8da184ec78e4d2156aad4ed986f682fc13fb186
SHA2566c4491b61f96ba152991488fad08bffac168f8cbf245852509e8e1edfdc7e392
SHA5123e9bef28f2f68c0eb40a33a6bb92dbff3590e48d5aaf8865ca2afcc088ce394109d12a6b752d477090d9667fc12c3504439fec3c240e24f6dd1aa2cfebbcce93
-
Filesize
2KB
MD5dcf43575305d3966eb7ce0b317d63398
SHA10fde700ceb4850971e21ecabd4794776a2b04b84
SHA2566d85aaa9e45be0047a4978d5392019fffc18348c0a926cd7a7350a272a612d36
SHA512b806a8146714a5627feb20efd6b9ec6f020519b78db6eb406d44137c4224f805eabfd0423add8a78cf427886320cb98239fcf741bcb0b6040376042d06a68a36
-
Filesize
1KB
MD51fe480db09c1a4f0ce9481c93041efd4
SHA1a3f66bbaed77bb1734f16e7482f8d60acddcfd0e
SHA256640cdfe19de1733cdb7833e4f2334cecebb8fd87c76e7a6ba18f9b298a4369ec
SHA5123891892b37d0e04dd372032a89361c1c2063cc508328ba4334a2d55098d119088eee44707fa08ed607b5c2c32e7256ba6d7560241e9b98a5161fbc56cffe531a
-
Filesize
1014B
MD55253f44362742a45fedab0e9388d03fd
SHA1e415649d5baa2d714267c0de0e335f2f47873e76
SHA256b4cf9f9084a4f615f4190305c0d272f4bcfe43c5503c775dab6dd6c70f3062b8
SHA512c3c4a073787703996f5638ae0c138a2cc9ff0e5f4d58f2314c616569efa80f19601c456fce3f3ce5ce17f3c71971c93dc0ed4daf8299be77e21690874f06d034
-
Filesize
538B
MD56efc3724d68224a44d296f2d61d01a6c
SHA1fa87871d6fa58c139b80388f16ccf8eb6a378846
SHA25666d65704cfb272e694b78c0607c14af4c25d20ebf06dc4f63ccf6c5562e2c95a
SHA51204e6fc826a7f1981912db4eb02e49504b2298a3f57a56d79bda2081d575750b9c5c65bad9d65cad51e14c13c949415843ed2838707988fcaa343fc17e692d798
-
Filesize
371B
MD5405a9429bc7623c1a90ba3738bf8cfa8
SHA1de6cefe3176758787d30bbd3a4a5d1dc104fd91d
SHA256d76ca6221f180bd9ac1a4df06abfdcfc2b1a5910fdbc1062b4f2e80c113be24d
SHA512432dffb37c8d2dbd5537fd865e5742032077e362098135abd1583ee0fc11ab7a707292861b17a19ffbd66ddfe72a29f664c9116e4140c9a081a5c6fcdb490442
-
Filesize
5KB
MD5ddfbae8e1fe27cdd5b53bb5aaa5f4721
SHA157103dbb429a5f7d47faae0b9974040024e768fe
SHA256a5143dd16d29bde2c106b66fb0be6a9427b04d3bb8e080e6ad0b0d31c9ca3fdc
SHA51232efbc35baac6e0bdd4f31b887ebcd69d8fc53a885ccef149a7d969b3133c2b3b289e321edecfdd3127cc8b19d8f0e8c13f9ad620ebac1931f980ad158dfb5ec
-
Filesize
5KB
MD5e6508837efc036c93acfc9a0b23ae869
SHA1f8f1c025b2f0c1758611fa6a69cd1643533d23e4
SHA2560a3ed75a392f0178edef98f8a0d7a862a3bdee87fef9d6ddbd9ef773531bda84
SHA51219525968570c3ce0d5f49c60d297d499e1fb0c21ecdd0aa9725ba2e40271675c1626fd65641cd2842105fad88e9d0963ea3aaef474dbc0f58685aa6240d05cfc
-
Filesize
5KB
MD54c6dfefeb1ff6469d056281cdb842622
SHA117605d4023703485581fbd5c620ec1c2a57c3bc5
SHA25691a7e0a609472d527a8a16a937975d9397c2ce02286e137dbc9bd6d3a03a6a4f
SHA512b107ed00a128ac3baf7c5c8f6a19b51e99e49f70ef7dcdf8fc32b92c8ea000d6c755042faac371794365b4ae4c557187a479a4b189f77b971c692467756bfa6f
-
Filesize
5KB
MD58e35ac9bdc5c9388baca7be6b96ad663
SHA1274155fdce2ec06b3ec2ef05930135d51f97a2bb
SHA256ce65f462d1700cbb8f671fe70ce590730e50c25b4fb92b47fe3927993f15d89a
SHA512a85443ab9326864e884905fd7e18f7b3d76e237979270b1fd0febdfbbf517da0a51d082db9e1ae7261a3b35ad12b9c119c9ddccb64f933930e53c562c64fea2d
-
Filesize
6KB
MD53943b69cfd7eb5552067c72ee730530e
SHA1abbe0f136c345d234aae4519326d677a1988fa4a
SHA2568233e0481c16811f5d4ed926ccb69c13e46f4d61c26e29cf60d31f18b8b7ab10
SHA51212ba34dcb9a439def3a8ebe3b521fd0eedf80046dcfe484bcf5cb6a9a78bb563a205288cb1b1668be3a435e95cc851227e49e605bd4174c5e288b4954bfc3b0d
-
Filesize
5KB
MD5be09c646f9cc8dbaf766689e1cf7f603
SHA1bbc23ceb83f7d2dd67df2ce5df8c96f25aa88900
SHA25623e4b5d822e871cbd8693126c5c9db62821957f76e2e000cc1f4ed51959b8853
SHA512cafd88f425d5d88a30b19c70c8bac45a2a9dfbe4a14296e81b40cde056e21c44b0e0d1aa5517a09f0f4801dbd7ed73831b254a786329cc0bc220f07a91810485
-
Filesize
177KB
MD5235fce7d674d40a6001b6caf2c8f8b65
SHA15c1bb3f4d73655f1c9494c6df4124f420cd93744
SHA25678ae5d4badb5bfe5cc074f157433ff62422edc971aa053a2608444a3feaa5ca1
SHA512e03c9a70084d96dd1e74d2dde258758f861170010a293a8bfb41ca13542e74c4ac7a3216b7ea5e04252f614c34da56c4cbf0fccab926eecf101508c2f733a1a0
-
Filesize
110KB
MD570eecde0e36d78aba4e89b10bd5edaa0
SHA16ecdcda10ee9eef21545f629af439991cf439daa
SHA2564fa42f25e36a1f8358c67507c1743954e12d83c5772cbb86240299253f81efb8
SHA512e727772eb5b4f6b1b93edec50cde3be6c9c2396d680ad693a6c0e2e087bbc048eb318c4bd9eeacbaf8bc327abc525358cfca3d837552dccc5d48aae29f188842
-
Filesize
107KB
MD5a67ff00fda564832b8a6ef164c0c9cd3
SHA1990029e7f56d8262f7bb86ffeb8ce481470ed505
SHA25606e4f8b26edeb8fc3e2f65902f96987ae9a435bcfc9cb50ea9b20aa523b0a1cf
SHA512a2268b2102464468d0a3480a2ce2a081415cf4a80da1bfe002154f9a56fd4c9742018aaa9c471afecfd262c7c03601b84accc4657592ad0c938661037a5c46cd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2KB
MD548a42989e3f44db40ac35be1c9a9e733
SHA15e66d1d0c0e696b4c77bdfbf6ba0abdda0f67962
SHA256d59b502d40f5a9b923bd8e1bc17ae4a2af83c1648fcbf687dfbe9219b16780e6
SHA512fecf31f81aff66036f509b298d4c8bd6effecaaf1c1f42adb1ce3bd791279c141b87d8846e316246f462df4abf35942706fb82b736739494043e1636da8aa404
-
Filesize
54KB
MD55f612d9087b8bcadb4002e6b026990e8
SHA1b5f343e569abb0849c06e3d77d00cc1bd2d5f589
SHA256838be164025509d2c4dd005aabf7bbca522b703e931d9c21fb287b5f06178450
SHA512d5e3e0eeb9b4d3f7ceeba19bc83669258d77d6f973e90049d8cb2796e3f0f6502209e1863ba0a0c7d69b1cc3c0a43e74b9efd0557854ac349f3ffc51d6ea1c59
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
648B
MD59a33a82f69f44a61585c83b579fc548f
SHA10cae7c41fea0ed57f7b766d69efe3bbfeb13c43b
SHA2567e0e5d39b803020fbf6814baeb989555114417e57938692fd69d094bd48dcc94
SHA51225e57c130a63274f35aad81b74fb532183bb44b26641040f937c0196bc08a8e86476534d9e7dd591077b01d98f5e7c27430bb183622be17638b26b8d9be4b1d7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize5KB
MD5722a7ae622cb3ffafef8c41aa9060c9c
SHA1020df2770b308b5aa48bd31064b298605469adfd
SHA256ffdbb787503a402e7ac7ad123639b57bda6a027999f9e10570597f61bb81f839
SHA51241a511b7a8fe03ea28a51f55f561fcb311def1c65cc39755bb64b5e24d9db51ff1d1e843dec7d62f8df898b75a8e1e4c23fad533507254f12be4f23084b10e67
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize5KB
MD509a18ceedfc3b8ee2b538c3fcf1bf6d6
SHA1c44d18d5308a8ac8c8002b29b93848e504e3a0b9
SHA256bacb1b364a89627aa7e43a0166b73539c3b87565517cea91e707da4bfe06ce83
SHA5122cbbb9fb76100460d07eec2e7efe475d36afa775ae609f7d3949076b56a7b1763cac3f2f8ab74575925bdf8602bf77b329b0c6cb79aed9d361b1677d12f60d3b