Resubmissions
03/09/2023, 16:24
230903-twge9sba2v 603/09/2023, 16:18
230903-tsfdssah9y 103/09/2023, 16:18
230903-trxxfsah9w 103/09/2023, 16:01
230903-tgjxvabd43 7Analysis
-
max time kernel
280s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
21mDJCm0.gif
Resource
win10v2004-20230831-en
General
-
Target
21mDJCm0.gif
-
Size
6.3MB
-
MD5
30cd8b85b2a203cd9ba81de0d5b43462
-
SHA1
91086e3d6121a76c2269c333a0466b301de8c52a
-
SHA256
63bef0f06a1edd62aca4c666ac89ea94f09817f9355da918130f0299da85e923
-
SHA512
4382ea8d33011adf1ac1d13f6c6bc30e3664d693c95dd7ed998f9b67086f419d70b9ecde3618ef5c637e63d575a8b420d1e2f407cd1385bed35a5d3c1d18764e
-
SSDEEP
98304:RVIUqcdD6rR5bD+rp1mk8t3TEvMOUSsRtz2Cq833I:l9g70p0b3TExatBqx
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382315743457221" chrome.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 2200 chrome.exe 2200 chrome.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe -
Suspicious use of SendNotifyMessage 59 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe 3224 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2056 1592 chrome.exe 40 PID 1592 wrote to memory of 2056 1592 chrome.exe 40 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 2284 1592 chrome.exe 86 PID 1592 wrote to memory of 3156 1592 chrome.exe 87 PID 1592 wrote to memory of 3156 1592 chrome.exe 87 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88 PID 1592 wrote to memory of 368 1592 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\21mDJCm0.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9682e9758,0x7ff9682e9768,0x7ff9682e97782⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:22⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4732 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5072 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5200 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5320 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5160 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3240 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5128 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5704 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6216 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6208 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 --field-trial-handle=1920,i,3985041397697219429,5314243354173453509,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1256
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x508 0x4fc1⤵PID:4212
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5497835d373e12af4cd257487dd5d3612
SHA1425950e9427926ac0aa7940c4a18a44ab59df47a
SHA256e11ff08dff0a884b311133e2469146b2a54319cf60094511e098df0c3677c4e0
SHA512aa05611f56185e02289345f9c286ca98f96d5e1d24c8d152605e866e60013dc2945fc60f826e81459003ca9c2b7d439c0f6fdd173cbee57cd751ee51b18d2bf7
-
Filesize
69KB
MD5b4c19035f7c0fb6c2afc078ef3e21f2d
SHA1a3db7f7fde45ff2782b36ea3219a132cd03870b7
SHA256a57d662dfcc3891cb82d84f266bf2d61a92b76bb986e4f8490f97e9b7636e936
SHA5129684d9055ba905ce566991c722f0f7ee1d8a61948f81b03f6344279dbea8d07ba43b46a38be7e5a6020df4ee4c9bdb1a866cb52553ffef582df665e84ca7b3d6
-
Filesize
17KB
MD54d6175b60ceaa9fd3037202294cb9d79
SHA1f52571c50a9a1d0505d14611d68d40fee99067d4
SHA25692b4062291d1a4848ab6c1b4d75bff55816337a5f664056b77ecaedf44a2b9b9
SHA51280a9bb8b5856b23aaa271288668e8f07affaad56ff36fe2ae68b4261539c1b831fa667b4ff9d512db2066578bd705a3f2084c2d4e0d8096f3a1e26bdadf26c9d
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
768B
MD5924a2fc3439bb7ccf8e3409a79905dec
SHA1c163248815b15b90265e52994f24b2cf453830bc
SHA25608512743f0126a9a14cca4249e6d505d12f1e8ecac80505b9358e60514ccc710
SHA512ec8ebf3720df13295f795899b6debfebfbf2103b4a9bddf5ca121ad2bf8f5d07604f0888b6d25e9d2b786b6e872aaf7512a5e534df154304992e0f6ab104f19c
-
Filesize
312B
MD50bb638a4f768584b72b2af1ce9e2391a
SHA15f7dc62d184612126ed5c79a4092b4b5ae84336a
SHA256d777bbe5e37d4a1bff9663f53808fd693a41e68d4748fac8bb938a318e46e997
SHA5122dd20f06875a6d9d34613324aa368a35526217e69cd3b0a3db0c3d3e3b759dc92770db0b5c4511486f35b38526d646c864783b1d33f1184ce597fab92a3233bd
-
Filesize
744B
MD5632936286b3fadfc7593435b7cf2584a
SHA19b5be3467e7fc6bdc309972df8f9701b85f6500b
SHA2561220fc4eec7c72e98093e06cbd5d2a994c10fb63478b640a7b56cc4ca29c4d45
SHA512a506bc952e9e8c4864f293edeeb638de789eb1e6539d1451c17c0c88d028a637c95d1033027d44af12829a9622b2cf8a65e5682603d4e44f375f1731c86dd3a0
-
Filesize
5KB
MD5da6cfe705f12dcb69ad8b98acc02c17d
SHA14a39ea0802895e22953beab08c2519b5cf6b1ca7
SHA25642e213b68cfc79e7799d50bb51019cb734be9e9cb58eb08ebc8ef02dda44a8c3
SHA51235edbf5a3e1d06b6de640d2b604622bf839a3593a2fe228408724f05f652b86acd313175f060528be047aeddc73e70c8889ede96ad7fa13c59a5d9d0e292b14d
-
Filesize
5KB
MD5aca6f47d301cc6f5a3942c670ba049bb
SHA14b03ce41a123c7ddffd7ca45abeb207c414f2969
SHA25685d85b30147d5738035f938856dc5f66f799877121ecb5876045dc0355f45450
SHA512da066a3c1bec01d2df60efc81f2639bcd227877ceeeb9334fbc508da579399d5d5648f219f435bf23be301aacb37149548a51e0e623a9eec19d90c0d06deeec1
-
Filesize
4KB
MD51a864dffc29c2bb12019ba1cdbde88ce
SHA1cabd87d88d6ef8e4a3675d121981628bf3790d2b
SHA256de18f9d3daa6dfcc36c5edcef96bee7f74c82d0670476d878af0a86855ef989c
SHA512618e4632879f7e6015fd928a38c2fbd50ef4b757ab9d0da0c574dba5f22bb427a4172631033d91a09e1cd658e44fefac3e89052ce053b90556c423d5c8b662d4
-
Filesize
4KB
MD579bc1d75005fc799e88d6fbd97f9a5c1
SHA1493d0a33746b583ceaea24535aa17a2893742f5e
SHA256ad53846e06be99d8723eae01deea689c27d06deccb571ff663c59dd35466a158
SHA5128b8fad6d4211b28d6c11bfb05513f4e748e0343c06b67b696f9ae94932486f99cda700e0c1fd4d7cc9ba702d8f30d2c8b68056ef9dee33112fb5fbb3a68b09e2
-
Filesize
1KB
MD55b0e8f3362915b955bfaeac5ce9ec772
SHA11ccd406a9cdc3fdef755f4a2db26587207471c9d
SHA256e930f4a9a518ecfdfdd51d8798af4b1e6b2598c90bc37344891b80cdd64422a2
SHA5126f88d134b7acde884022e0cd195deb1d07db9eace865ca88a84a47140485bc1d8668a015673e9ddeeac8c900222668b593bd1c4b6647eaca9d9de4dfddc0bac7
-
Filesize
1KB
MD5c8a73b57224f9bc9e7101204fc1700a5
SHA10285e04a5daa6af9ff6f9c60c9d8b05d432c89bc
SHA2560e2a7ec1c09dba9b141e2cb4ad1000c6aa8c12781cdc2c9cca15d5ac7721eabc
SHA51219d058c3199d42c0cdb4736bcfe0bc9971204f6807d572054f17c34b45b69275b823a09acb154b950a5a9b97c66be224cedcfa8f466a507017143c416e83954f
-
Filesize
1KB
MD5a47599a58d786d122c7139dcdd63dbaa
SHA19b221810a75709537eb2c75d935ead35a369090b
SHA25658aa5322dde4866025a8bd31ff192c7aca4a8a6d97141269b4f18ba98bdb6a08
SHA5125d77150b440e0ac7f4ee580749929f6dd01f874ab7fe73a684fc6d95a8d4c56588a8406e917ad65c8b47f41b1de6860a3213b45b56e060188ef24c96dfaa4d45
-
Filesize
1KB
MD5ac29239573574321d834a77891ca64a4
SHA10830b28c9974b1b4d839e77073847ac7240f79b6
SHA25624aa7f10369e35eca302522e005c19b62a7f63d047cec89a54c53120bd861ea8
SHA512807c6ee860883a4bf7008d0b98f390c093cdf8b46e11f045dfd6a70fdd5918c9fd05900445524fb0c8d6c9fc7715ac3b2496b5f3ac9dc592d1cc43a2c96ab7b8
-
Filesize
1KB
MD5ac1413956a4e3d89cb692f657ac5fea7
SHA1ad56d9f3141e9a836dbfc42694a2fde67f327ab4
SHA256539d0f9ef0cb707877d94cbfa3bb1db53ecf89d81e3c8ac3831292f7dc7b259e
SHA512f0e86815d8b1a53911157b537bfce52258633c5f22134be7e8593022a971dff91881ceaf72cfb1b01aff7a7975279cf5e6b8c5e09cb55bcfaae3f4e102a8ae20
-
Filesize
371B
MD55daa91634f0d697b865176bf70070864
SHA1f9141f133542a20668ce762be8250d67a4cbdcd4
SHA256cc53f4bc6c6d00a7fd35ced1dddf80a5676f63c2d54ca4d120e6898e066c3aa7
SHA5124708419672e4e85928f81fd48fd127c2e90b435c48a608fc39f8ceb6e2cbfe4c8f139cce70a9f8a11b2e752eaa240cd044a72bc7b6f6222a652b317233ab77ca
-
Filesize
1KB
MD514d0a3462f9519653cb21c3bbd32abf6
SHA1d01096c25bc3dbadb422257e067dea3939a2668d
SHA25602df5c57c618cc62ed57a745d74c6e5581d80a12854f02bdc69970a445ab93b6
SHA512e689ac73fe2ce4a8ef9e412b87cc0129f4f6e7e11023d2bb8be18db82eb10513e7697e2e512667f0db1c005e5b275013b978492f80764bdad004b17e0ec8020a
-
Filesize
371B
MD5103e4ae8fe5bad0443ae6180575cca76
SHA1bff1ad83a568f95315bd043f52c5038eb1dcd8bf
SHA2563257488230065d9968472b9bf393c87a0ec127519d50abe04ea399863e1e5856
SHA512fe38bf131c2d4d14e5abff838545d4a7f1016465c9e1a0c862039eb695801c21d0735ccb17c2e2277aa88555f08d9ba426dacf9d30982cad696b136866b3ad3e
-
Filesize
1KB
MD524c36c86044a2a190a4c2254011bf8fb
SHA1ece318f5cc8a45134c64b6e950812f96f6881f12
SHA25659c3db1daabfe5ab761dc51e5045882c93ec9eac9608721f9f85070983c837c2
SHA512c1cd5e168780410b0c48161f5aff5da9b3e5dd502b296ab0f4ae5c7faa115308b1b873de1032997bd729e248a4e3ffbbdc5ee6368ee2ef2b0e7b5cb36dc02467
-
Filesize
7KB
MD58f600dfb44f0a3a04f16c79b06edf90a
SHA1a1cac2025a2bae20371cdec77c2dac72111003b1
SHA256499d59a83ac301bf868f6342e08008b946b66c5cbcfb15b69ad0f28c28273ed0
SHA51242848be1726de8a63890e3506748c4af367385353218b35b6b8c06678891b816546b76bf35297edd7efabb96168c86c20a791433c48418f131704913e579eae3
-
Filesize
7KB
MD550b2f5951db1d883fc4529dfd2d13781
SHA1710968013a18c3f358de876b1908a44b8762d159
SHA2567fd8b2a569ba12696b0a104b19d302a46db5d07eef6c81c658b88b29262a917b
SHA512c9184b49dcf18cf4d1f00d7089caa76290c0119e3e8ba895403ba5b7d1d6cc591c3158f2d9567c24e2ebff556d039aedc2dc88585891067783470b07a2e24623
-
Filesize
7KB
MD59a306650fe721d11c64b9ce3b2e6e063
SHA18d1020e0be43e7112772bc3decdfe38e96b8459a
SHA256ba86cd4948de779b2a8bb02c5b6705c45f7d1ccb260983a36d3a0784096ab319
SHA51274286b3ba782a8a8e5d8f13fe0cfada90fd2cc175c5e5675b80364914ba988f17b32ab5e3d66385d926561e151f778e738a4b274cb1465b25873121619483819
-
Filesize
6KB
MD5120a34f0931a899754033748ede5c05e
SHA193ead6715d6f8a69fc115ac5979fd169775f4961
SHA2562d59c4d746eb116a02c747b9834986c8e6641321d89f87a9b6a6e1c15fed58ef
SHA5125389058ca8d356a46e34e84993c8c5acd99b22d1b6aad9310e4f507a2f87f396e289d67cb7c105a53f592f0906e9c8582061ff95d814cb7694d24676c439a6e0
-
Filesize
6KB
MD54303f1d92138a7a138f511077ff3df3a
SHA17c9e7f882ba547b338a09f32f1379689bdd49496
SHA2567685aa72fb93f3f41b40cc4a8533e1025e329fc62871ad866338df19f72e24c6
SHA5125dd3800ed738aba3a88ba7ff7fcf64c0164a2e3347e0f4d03aee88eccc75058e096066884dd6a494b13a9d707e1a120f965074917e066acff8b4ab05c6e116a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bed9f68e-f473-4a51-9a18-e13887be9b9b.tmp
Filesize7KB
MD51a146941bef13ba02a554d13f9edacc9
SHA1b72df6e2eeadffa06dfc62a4e8dd4dba5c010762
SHA256b81d5b05fc9fb356459d417f7d2de1b416dee69cfc6ffaf47928fdaafb8cbc0f
SHA512de57ff553c571749d0ee2e061a574a5d801f2d27997cc8a832b7e408b9070e6c3c0b281b3211e6f392519e0fbf6b12a7b546e988fa60024049fe312c40724486
-
Filesize
97KB
MD5c6d89ee791026709f9032bab464ebaaf
SHA1f9c1e74a55b3cb395534072ef217ef42891ef069
SHA256145343e90e8c8c23600515ede81494aab36b885ef6c10f4f0c185acce74e230b
SHA51210851f4770b5ed5eb23e5da18fcc8638fe43d3786f7e71fad747405d0fc159ab711cee87c38578f70e200ac48bc11701125f3bc2a43d6b8dbd1816429d20e66e
-
Filesize
97KB
MD5e3f9bb61b3bcb24fc52622614d58b940
SHA1651bebedc07c1f0bfa27c518a0cc18c3af7eede0
SHA256028c865373abb1aaafb1cee01eab23911ad9cc1ee40c51435cc240e5776e4bb7
SHA5128da30884ee4f7f7fdcc5c71053dfd4e53bacc4328d00e52c33a27d3a990eecac67b69e8ad740bfb99d96f655623775e3f557df2c5cf5c1db57e36c49bfe8dfc1
-
Filesize
97KB
MD582c9ebefad0fe52ffe8d69a9defa4ced
SHA1ad8f1119af290c0b6b5eafac6115aa5e54fb1183
SHA256db68687106a98c817dda391ca1692b592bc7cdd1afb2f3cfeb1716e4f10d68ba
SHA51240471030427a507836bd9aa562341f3add99c9d6fae36cd3d2b43ab5d2b6df84e29919ba2fbd71f7e4ea57f2f9d690ab11b84e90be50d98509fb8206aa4ac8a2
-
Filesize
111KB
MD50dd273296cdfbe6eeba894217d7555ad
SHA19c03cdcabfce4855a715523db1e6ab5050da4a60
SHA25634d8019ab4fb0052dfd577b3e24f2110c9655ea3c96691fe4b9bbe31c561a64f
SHA512fd60712f8815a4f9d8a32d3a56ae69a307ccac596f993d09aee6908055b90f44f5652d5be89b41814be0a503dd974eeaeb1a33e76cf9e43a105d9e71942d45a7
-
Filesize
106KB
MD58353c2f033277b02f4f85719295c3cef
SHA15e37edfbf9b9b8b85b0b79bdaf57e37d30220854
SHA256e274e20010bd00811d1a74f356cc06c0a522e0e2c4d94b45e692ae5d443c94d0
SHA5128f6a5db1d806aa4a9165172ca9f10dc051896e493782efb926ffa3a6e512ba82c09c3c05cc12b17ed2a51081b02b3e6e03171f8524a51e66b8d316d82af2f10d
-
Filesize
110KB
MD550887c1d071e4a2a2d6fcf6ea44f86f5
SHA1f51ee62927f316d386109135b2bdde7148538f46
SHA256509c417798d8b718fc2ff22a802a02362eb119b721efef3870e2bc67828ead5a
SHA512f47792634f2c9c99cea6d4616e496fa22a09d6d826f5ad1ca19a4fb8485617f5c10651e73a9f60df6e153fab60ef009d1af1db93059830f06a667748f5cfac90
-
Filesize
100KB
MD538f24f1a104c282bd9ae9062fe008a27
SHA1a390850f79ad51291e48d3c6acb8218566c1fafd
SHA2562b5a188e545dc7d6446d80d66b5a2a210d528adf6488dd485486e28f9c9d9646
SHA5128318f41df5cbc6f5cc6f411455e2fc64f2868fe7fdae8674b5df4cd472caa358eb10841cb5a94be454482ca45920ff3abb63a781b8441bb5c53016a832f09a5b
-
Filesize
96KB
MD55823c6f730610a4cb50f895bd83c05fa
SHA1387506bf1875cc4b32cbacc846a0276e79eba35d
SHA256bed5a05d68d3e322313d593dd2f1bb9cd99e054e459458c38e73ffdb62de05e2
SHA5123427c81a356ae1f5adac17e835e6adf18d83e8c5627ce18b9976afc6c9a3ea00b82053cb6347b29de86d616144af9eb81fc1c196c28bfc19aa21281c5dd89ff7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
8KB
MD543907f1291382e324f37936d3bc1e80b
SHA1969286267c4af1397ce7feadde3c68ebbd708e59
SHA256a47a0a0d38a2809e2b2df72d81cdef25993a332c468286782369143bc4afdd20
SHA512c519992be31d36a2cca8651be888cd11a079efef1fa556afe1b64877ff8f170c2c0a42c02aedf54080fcec47820609d8598103c0644ee836ed7adad6fd953f0e