Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 03:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://googleweblight.com/i?u=https://urlz.fr/nFBA
Resource
win10v2004-20230915-en
General
-
Target
https://googleweblight.com/i?u=https://urlz.fr/nFBA
Malware Config
Extracted
remcos
Crypted
ourt2949aslumes9.duckdns.org:2401
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
paqlgkfs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
ourvbpld-RBN2WW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
ILINV02655092023 AT20231749.exewab.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ILINV02655092023 AT20231749.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe wab.exe -
Executes dropped EXE 2 IoCs
Processes:
ILINV02655092023 AT20231749.exeILINV02655092023 AT20231749.exepid process 756 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe -
Loads dropped DLL 12 IoCs
Processes:
ILINV02655092023 AT20231749.exeILINV02655092023 AT20231749.exepid process 756 ILINV02655092023 AT20231749.exe 756 ILINV02655092023 AT20231749.exe 756 ILINV02655092023 AT20231749.exe 756 ILINV02655092023 AT20231749.exe 756 ILINV02655092023 AT20231749.exe 756 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe 4388 ILINV02655092023 AT20231749.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wab.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Hovedrigt.exe" wab.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
wab.exepid process 4172 wab.exe 4172 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
ILINV02655092023 AT20231749.exewab.exepid process 756 ILINV02655092023 AT20231749.exe 4172 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ILINV02655092023 AT20231749.exedescription pid process target process PID 756 set thread context of 4172 756 ILINV02655092023 AT20231749.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3480 4388 WerFault.exe ILINV02655092023 AT20231749.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397389365418485" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
chrome.exetaskmgr.exepid process 1284 chrome.exe 1284 chrome.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ILINV02655092023 AT20231749.exepid process 756 ILINV02655092023 AT20231749.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1284 chrome.exe 1284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exe7zG.exedescription pid process Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeRestorePrivilege 2492 7zG.exe Token: 35 2492 7zG.exe Token: SeSecurityPrivilege 2492 7zG.exe Token: SeSecurityPrivilege 2492 7zG.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exe7zG.exetaskmgr.exepid process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 2492 7zG.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe -
Suspicious use of SendNotifyMessage 62 IoCs
Processes:
chrome.exetaskmgr.exepid process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe 2584 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wab.exepid process 4172 wab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1284 wrote to memory of 2876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 2876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 1876 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4592 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4592 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe PID 1284 wrote to memory of 4496 1284 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://googleweblight.com/i?u=https://urlz.fr/nFBA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942869758,0x7ff942869768,0x7ff9428697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1968,i,5473545947195584801,9132619197589002063,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\" -spe -an -ai#7zMap1040:114:7zEvent292061⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exe"C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exe"1⤵
- Checks QEMU agent file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exe"2⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exe"C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4388 -ip 43881⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD59add5d2bfbc753c6a359f24bc918453f
SHA10cb1ed4c25fa6d083a58909fe50769bb67efd0cd
SHA25662050dee6b4e8d7ef049705c4bd2a91a887f1ff359c0b9fa43dd0d4a4d747627
SHA512b1107ccccab8476cb6ce886e989608fb949807b07dcf528adbedd07b615a86231bf70d5fd9e59420bddaf8c5bf2fb878fda8130d96a56f335ac97a6664c181e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
536B
MD5a625a3bdd6516635e75c0302cd8abc31
SHA1ade65fcaf06697bee85bbbad3164aae60da4144b
SHA25636362dfd240d9a916c905d2dad35526dffa36af86f2578cabddf1a18c740144f
SHA512222a194ff22896101f89f8b8ba5b5f949515cdcbd94c8500584d52ed2a3d0960d1f168951854476c9248feabd629ba43efd97df596b6c073a29b11d7bd9870cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD542531ec42e83c328d1ef18dbb7a0abce
SHA1abe4ddb2dcc57832ae2e48a36093d8fa9090ae3a
SHA256be601b6e488a6b882e97f7628b56881a41a9df5be339feda9cbac847240af1e6
SHA512442f62c8048c677dea0ffac8e27b19c38c499a7cf8822788a48faaeb44dc1807806d1c216ffc253171859e5d306633690233ad0a7266be812eecb6d8126e1dc2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
102KB
MD57539a8e995e948fe8a703f2965f9816d
SHA17680c5a7335179fbd3c986cb66d0ff4d19c8df0f
SHA2563316edd310f920a7db3e63bb0fd3efbf2305076e28ea3b5e88340c258b5b5e33
SHA5128abe0c438a3d95a6301a013b57e2b7e53e76d7bc8c7e3a10b12c21ed692ea8064c4ba207c1e0fabcecb1e67443e817b0eb59c7781a856e96416ac9f056e56a25
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\BgImage.dllFilesize
7KB
MD5487368e6fce9ab9c5ea053af0990c5ef
SHA1b538e37c87d4b9a7645dcbbd9e93025a31849702
SHA256e27efa5dfde875bd6b826fafb4c7698db6b6e30e68715a1c03eb018e3170fc04
SHA512bb3ed4c0d17a11365b72653112b48c8c63ab10590dda3dfd90aa453f0d64203000e4571c73998063352240e1671d14da5ee394439899aaa31054fa2e9b722ea7
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\BgImage.dllFilesize
7KB
MD5487368e6fce9ab9c5ea053af0990c5ef
SHA1b538e37c87d4b9a7645dcbbd9e93025a31849702
SHA256e27efa5dfde875bd6b826fafb4c7698db6b6e30e68715a1c03eb018e3170fc04
SHA512bb3ed4c0d17a11365b72653112b48c8c63ab10590dda3dfd90aa453f0d64203000e4571c73998063352240e1671d14da5ee394439899aaa31054fa2e9b722ea7
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\BgImage.dllFilesize
7KB
MD5487368e6fce9ab9c5ea053af0990c5ef
SHA1b538e37c87d4b9a7645dcbbd9e93025a31849702
SHA256e27efa5dfde875bd6b826fafb4c7698db6b6e30e68715a1c03eb018e3170fc04
SHA512bb3ed4c0d17a11365b72653112b48c8c63ab10590dda3dfd90aa453f0d64203000e4571c73998063352240e1671d14da5ee394439899aaa31054fa2e9b722ea7
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\nsDialogs.dllFilesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\nsDialogs.dllFilesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
C:\Users\Admin\AppData\Local\Temp\nsd1B44.tmp\nsDialogs.dllFilesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
C:\Users\Admin\AppData\Local\Temp\nss8C0F.tmp\BgImage.dllFilesize
7KB
MD5487368e6fce9ab9c5ea053af0990c5ef
SHA1b538e37c87d4b9a7645dcbbd9e93025a31849702
SHA256e27efa5dfde875bd6b826fafb4c7698db6b6e30e68715a1c03eb018e3170fc04
SHA512bb3ed4c0d17a11365b72653112b48c8c63ab10590dda3dfd90aa453f0d64203000e4571c73998063352240e1671d14da5ee394439899aaa31054fa2e9b722ea7
-
C:\Users\Admin\AppData\Local\Temp\nss8C0F.tmp\BgImage.dllFilesize
7KB
MD5487368e6fce9ab9c5ea053af0990c5ef
SHA1b538e37c87d4b9a7645dcbbd9e93025a31849702
SHA256e27efa5dfde875bd6b826fafb4c7698db6b6e30e68715a1c03eb018e3170fc04
SHA512bb3ed4c0d17a11365b72653112b48c8c63ab10590dda3dfd90aa453f0d64203000e4571c73998063352240e1671d14da5ee394439899aaa31054fa2e9b722ea7
-
C:\Users\Admin\AppData\Local\Temp\nss8C0F.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nss8C0F.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nss8C0F.tmp\nsDialogs.dllFilesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
C:\Users\Admin\AppData\Local\Temp\nss8C0F.tmp\nsDialogs.dllFilesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
C:\Users\Admin\AppData\Local\lvhyttes\Damperens.konFilesize
289KB
MD5266ab720314def66c8d0a68408da2f76
SHA19efb84c44c298dff3a520ec8a4698796098692c2
SHA2563122ad3b9b1160128c8c02cd4bdba78c6eb01830d02e8ce6e9621970a6076d16
SHA5126c7bd787427ec63503ca7ac12557968da45c9675dc44d0a00c73a93f2acefa84c1bd3c636470c4bb81b63a152b26f02934bdcdc7f24c335c7217ebeea5592389
-
C:\Users\Admin\AppData\Local\lvhyttes\fascial\Lemmet\Showerproof135\quinonimine.fliFilesize
92KB
MD5440d6c203192c7b4a590b1ac35030f0a
SHA199cf8ee1d6a08c9301311bbbcc7f7a494fb73ac4
SHA25643555889deeb91c10006257e07794b0e40baa6c7c2fdb56ad762c3a4b1c0bc9c
SHA512a9cd8a37dfa2a0c7be36f4471b2ff8342b2931f2070d9a52156e62cff9ac0748f675ecbb47fddbef3bca42004272cd825433498d6e5e6f63b82ba07ec0970016
-
C:\Users\Admin\AppData\Local\lvhyttes\toreador\Handlepligts.PanFilesize
40KB
MD5632e0df9c66f816d3ade992d9b563cc2
SHA14142126aace83dea5ad81a7af0bfa6fba86bf35b
SHA256cf965b18b53a4f3de51b5113bc9dfbf956403c3dd1570661b003a0bfb73960f9
SHA5125d98c9a410a4bc9bf60b39169d8b7ad1f240ff678c67ebd436848cad161992bc4d7c0342ebe89e551a34e9305030557b8fb603b5ead2bff67e429ba199cef06f
-
C:\Users\Admin\AppData\Local\lvhyttes\toreador\neutronbomben.udsFilesize
356KB
MD5f4dc629db2af2e2ba87a2b3a49929c3f
SHA1d6b94278871e9d18da52329d4b40ae180bb9066a
SHA2564bc05dc1729c3494b6e529eb03f4394118f3d3224e106d12b45e291479c5d585
SHA5128f3301e16f863a5b87f2892bf7fc33d6a3a6ba8c1e42d352fc98c0f90a0ddee3fac4c3be81c92361e46e79f2b752f0bc70de6032d4eb64ff9d26a20e00b7e557
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749.7zFilesize
868KB
MD50a0c8d3d0e0efbf86c6af27a897b558e
SHA1de787990e5c45cf0be0c984eefea1095c6ae742a
SHA2560c5547786d446581041f3536a8d0ffd45a80aa2f280e7f13daad16ad64b53827
SHA5120e232fb1fda0da0dd3d0908d32f5582f6f4257d0d34dd27a5f8b7bdd59aa91a8e26de21ad003dc5d868b4041d834465b9c9c1545720b857f23b7335ee9603e8f
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749.7z.crdownloadFilesize
868KB
MD50a0c8d3d0e0efbf86c6af27a897b558e
SHA1de787990e5c45cf0be0c984eefea1095c6ae742a
SHA2560c5547786d446581041f3536a8d0ffd45a80aa2f280e7f13daad16ad64b53827
SHA5120e232fb1fda0da0dd3d0908d32f5582f6f4257d0d34dd27a5f8b7bdd59aa91a8e26de21ad003dc5d868b4041d834465b9c9c1545720b857f23b7335ee9603e8f
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exeFilesize
890KB
MD5be5a939ce15470cb418311a731a05977
SHA118792193d0d5291d0bc7cd91101b08a533fdbf97
SHA256878dfaab76cf42d9b0ac13431a95a6fbebd6f800e9e8d0538248e540f81813f1
SHA512e412e38812b20837f42e52cbb3d8459c00a5b31cfbe911310689cf4501675ef5def274c7da99c080f762f9882ef03757f73b33beee909ad4310cec713494598f
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exeFilesize
890KB
MD5be5a939ce15470cb418311a731a05977
SHA118792193d0d5291d0bc7cd91101b08a533fdbf97
SHA256878dfaab76cf42d9b0ac13431a95a6fbebd6f800e9e8d0538248e540f81813f1
SHA512e412e38812b20837f42e52cbb3d8459c00a5b31cfbe911310689cf4501675ef5def274c7da99c080f762f9882ef03757f73b33beee909ad4310cec713494598f
-
C:\Users\Admin\Downloads\ILINV02655092023 AT20231749\ILINV02655092023 AT20231749.exeFilesize
890KB
MD5be5a939ce15470cb418311a731a05977
SHA118792193d0d5291d0bc7cd91101b08a533fdbf97
SHA256878dfaab76cf42d9b0ac13431a95a6fbebd6f800e9e8d0538248e540f81813f1
SHA512e412e38812b20837f42e52cbb3d8459c00a5b31cfbe911310689cf4501675ef5def274c7da99c080f762f9882ef03757f73b33beee909ad4310cec713494598f
-
\??\pipe\crashpad_1284_DIXXDSHSDLGEUNRQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/756-93-0x0000000004A20000-0x0000000006E8F000-memory.dmpFilesize
36.4MB
-
memory/756-140-0x0000000074560000-0x0000000074567000-memory.dmpFilesize
28KB
-
memory/756-92-0x0000000004A20000-0x0000000006E8F000-memory.dmpFilesize
36.4MB
-
memory/756-139-0x0000000077701000-0x0000000077821000-memory.dmpFilesize
1.1MB
-
memory/2584-143-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-154-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-153-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-142-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-144-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-148-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-149-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-150-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-152-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/2584-151-0x000002586D710000-0x000002586D711000-memory.dmpFilesize
4KB
-
memory/4172-160-0x0000000073060000-0x00000000742B4000-memory.dmpFilesize
18.3MB
-
memory/4172-141-0x0000000000E60000-0x00000000032CF000-memory.dmpFilesize
36.4MB
-
memory/4172-155-0x0000000000E60000-0x00000000032CF000-memory.dmpFilesize
36.4MB
-
memory/4172-156-0x0000000077788000-0x0000000077789000-memory.dmpFilesize
4KB
-
memory/4172-157-0x0000000077701000-0x0000000077821000-memory.dmpFilesize
1.1MB
-
memory/4172-159-0x0000000073060000-0x00000000742B4000-memory.dmpFilesize
18.3MB
-
memory/4172-161-0x0000000000E60000-0x00000000032CF000-memory.dmpFilesize
36.4MB
-
memory/4172-163-0x0000000073060000-0x00000000742B4000-memory.dmpFilesize
18.3MB
-
memory/4172-162-0x0000000000E60000-0x00000000032CF000-memory.dmpFilesize
36.4MB
-
memory/4172-164-0x0000000073060000-0x00000000742B4000-memory.dmpFilesize
18.3MB
-
memory/4172-165-0x0000000073060000-0x00000000742B4000-memory.dmpFilesize
18.3MB
-
memory/4172-166-0x0000000073060000-0x00000000742B4000-memory.dmpFilesize
18.3MB
-
memory/4388-124-0x00000000048E0000-0x0000000006D4F000-memory.dmpFilesize
36.4MB