Resubmissions
10/10/2023, 13:41
231010-qzd8jafg92 104/10/2023, 23:08
231004-24xq8ahe52 104/10/2023, 23:08
231004-24pqlsfe6z 103/10/2023, 20:52
231003-zn52jsfe8z 103/10/2023, 20:51
231003-zm5pdshd72 103/10/2023, 20:47
231003-zlc8rafe7w 101/10/2023, 23:38
231001-3m4zmsee4s 128/09/2023, 14:56
230928-saz5tacc3w 128/09/2023, 14:53
230928-r9sdkscc2t 1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 23:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://192.168.22.107/acc_MOG#/login
Resource
win10v2004-20230915-en
General
-
Target
https://192.168.22.107/acc_MOG#/login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133406771733133625" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2216 msedge.exe 2216 msedge.exe 4912 msedge.exe 4912 msedge.exe 464 identity_helper.exe 464 identity_helper.exe 2640 chrome.exe 2640 chrome.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2444 chrome.exe 2444 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3940 4912 msedge.exe 46 PID 4912 wrote to memory of 3940 4912 msedge.exe 46 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 1332 4912 msedge.exe 87 PID 4912 wrote to memory of 2216 4912 msedge.exe 88 PID 4912 wrote to memory of 2216 4912 msedge.exe 88 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89 PID 4912 wrote to memory of 4116 4912 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://192.168.22.107/acc_MOG#/login1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb5046f8,0x7ffccb504708,0x7ffccb5047182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4448 /prefetch:12⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,686458232836776770,11962214648573464792,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffcba099758,0x7ffcba099768,0x7ffcba0997782⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:22⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4700 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:5452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4668 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5212 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5388 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4112 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4976 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5648 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4908 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5892 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:12⤵PID:6112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5528 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3392 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3400 --field-trial-handle=1928,i,5714581943546386234,4828676822451583963,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5164
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x4741⤵PID:5904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD57af63db34db605d8dd2c1c9a01b1e053
SHA10a78f5165c37eb51371afe2e9dde9ea1f70b8912
SHA256b4f04e6c5f7e27398f72dceeb47a4711f6b4d475c4a2c8c23e8930d6718ce938
SHA51278387a5038d814c1ac71a35bb44e0e1e9a49456e4b0da8e38766f3ca3f4ce9f973926697701bb1cfc47552dc11ccbb1326488e0a28f1b1f0cd96e60ace05a8b5
-
Filesize
720B
MD51fbb0bedf19f97ae5f1e5b2fdd623a09
SHA1c1aa903e3d05e92f222873ef7f65cc614a0ed5e2
SHA2563013b996e816fe82f60412a560a6fd8bf89fdf722f552a613406ebd62f36f07b
SHA5121814430d0fb2d1020002a8e199faa0161963716ff9fb52eecb7334ad37c0f3db998664a8443f38d967f1d47698d42070884aae1270c308e18a1829c6ac34eac3
-
Filesize
168B
MD5d893645b23c9a1788800a133b2a346f8
SHA174fa02eb8460a6163d0fc7cc1ef1156863063c87
SHA256e498c9b8b4b755691243ad14c1eccd7944c935f57079ffa44ab4bd3f5da4a870
SHA512488572edcda80ecc874f5f42b43f542a17a9948c6558f61047a3db2f374bfdb8dda5df01ddc9acfd3c54ad2dcc8935664918983ee33f1be5106f843b1904017f
-
Filesize
3KB
MD5af6da95278c1f3a1828abb28d63c902c
SHA1a355c2a55c23e287e25dabb0e5a02ecbc327e1b2
SHA25601fa691b516a8825356874a24dae1d5123a1a739e13721461ca836a9d7368c7d
SHA5128a83434c44a198e21e8a98a2b81c59e0c19cb0c1e1a6a1af58141b1c38c6bb927041fb98aefb7ff6357cc2c6e221d47318587268391e7d0846c98d7070b4b4b1
-
Filesize
539B
MD52ff9b68d159d54216f7783cbaa9f0083
SHA1107ca63df84f8fbaa1482482c52d5183a627080e
SHA256f3e6439109739b09a6b8373f6a85d806f9cd11c5f399de824c7ee15557eafa99
SHA512b27ef3eb7fa406e23f7bca6af1b9bdfdb72234b16acf97bd230952bc851e1db75c0d17665a41ac1ea19f7736177e18ed5e14c62736d5ae7fbab7c197cc80d960
-
Filesize
707B
MD54fbbd5df0ad6505b44aa0916a1413b6c
SHA1ae0872c2df73a575594acd9cb31a49cee5ddd424
SHA256263e3d4ee851d10f951f63006fc15e669d66832f6844e8c7bc678a62333596ac
SHA5124699a0175512da5eb15486e0ab58ba70a4b4382590279b2e3d7451b262357116362f95af4c6f574e7debd7dc046bdb868e0ef0c19055bc10b2c53dbc764148c8
-
Filesize
707B
MD57d3e57e27e63f847063131d545fa906a
SHA1839c919e308880e34a97de72ec0a5020a0912177
SHA256dff3af8b55484317b6150d614fdaf3d9df48b80d202e149caf0be150464dfea2
SHA51258bd1f4546c16ca097b7df89659d43113c1812a3c0a77a13921810677738d757c42b01c4f983f8df773e2eaeb27cc2a03b37db52abb08874414d09557b242598
-
Filesize
6KB
MD5eb52791ff0dd49a691a9c88f0ad0e04c
SHA1abb22ddc333c0d736754f05b4d4446ee47b94902
SHA25646f69c7d816607029b584b36036b42daf6a43cca9cba1c6b889d937dc33c2cd4
SHA5129819278306a9b8ecd2cb9aff503d6da404b1896358dd9609ad8a7ee727db1d132cb15741d96e2204773c2b155f8b2d39cf15a044ad6c8e85213605dc93aea119
-
Filesize
6KB
MD52d313cd0f97f1638ad94d7a51db7a0f2
SHA189b8e3f20fc50c7a29ecb68569161b00abbc8c15
SHA256f2cef6e529dae91397af2738f9ee989da2b674cf34d7e6db60792680475ce4eb
SHA5122f13322f5249b9d93edc9f7422662c8af202e79f287c8fe4bc6a92f5d40f96ec15e3d0dd686d6b242c61abdfb233fef0075a65cda3581ef261df9b854d88f9ec
-
Filesize
6KB
MD5735bdee980d5b8da46489424e308ec6c
SHA1d6d23b734da7c9a614adf13d3a2b50077486cf3b
SHA25673291f6026ed7ec7c445c99310fe8d7cbd83a3351e64d6200abb98d17ca8eb0b
SHA512066d7240fa81184721c0ed2b18667c4c196b8d680e83e20611f262f36526609ab3c2827d39ea349ed84b1c51a76eb6439fbd8dc488e9d9c2cbca3131554114e6
-
Filesize
15KB
MD568ec452a848cc0dd5078a7d81374c2db
SHA1fc65a966f8cdf2294c6cf39ea110df5d24709b1a
SHA256d7c6868f8e5dcb78ee787e87618f83084c54e2701da9aad466064a3cfa8b1bc5
SHA5121b8a8d3c2130b7d7e5f6bbdf2405a62107d6336c3e32750d8d1a444480abff02b99832f0d54d641105ad9f686f27a15607855fd8475faa39bb4e4d4dc465e62c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5898ef.TMP
Filesize120B
MD5996258325b58d1b85d4cac222b9dd247
SHA191f0908bf904615173783c1f39302cd20bfcd51c
SHA2567a493f4c9e0e1ebd80f4c403939979335a8398a3a6c707653b216ff939135f1f
SHA512e47975f8ada7b4ca9121e3407370eae05185372a3311bf80a86dbc647386025f651921dc4fd77511bb6d6962c97ddb6b61b38f976faddd1c74617cb31a7b8814
-
Filesize
204KB
MD5ca9a437ad2ab248ccde64a9e4d9d76f9
SHA1632ad645b442145282b9268d3c93722332273d71
SHA25637fe286057218ad54264b5135aab7bbbfe3888606433fa88d3cadd353fa866f1
SHA5126cc66cdd1e839677d33974eca4283e6dc0ceb096f96de415e0e39c35c06a7724162faf9e7736603fd8bff3bfaae7fbef133c227510b88a01b376c61c1e067c99
-
Filesize
204KB
MD568eff756b9234e314d73563b2766e073
SHA12c4b09fce46ee175fe286de976287ae4c8be3f2d
SHA2569d21cc8db44412bb11bc593ebb26f7d98e566cda662be34afc0093b6cfa5336e
SHA512cb7efb16849e36cff43ca2c99ea1f08e10f8f8832911c34ec5d7c4b0d94457641c7f7905b20093d7de3edd4539976d025aada42d15ab3f9140f080c15579a393
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d9141dcc17a409a1947221b40bae14f6
SHA1961be1ad6e53076f4a9b9cdc14fa4264d98bdd7b
SHA2563a2a295abbc809cf8b78a043e0df7b727299f81255e91da57393280d66f237a8
SHA512a3843d5a2a49833570c6b53ae810bb174bc8a39b19e03ae746b62a2daf1b369d7604443f3c442c05ee9a6f9e45787799b1176f5d2418b71d2a7f29466777e1b9
-
Filesize
5KB
MD501ef8c58bd6bfdefcdc08e8c2b42eede
SHA15aee2b5fa25391997ddc57dd39dda008aad67917
SHA2563a07429ebe673075f437023abed2af4a8601f4ed9bb216a0a53eed2880486728
SHA512bb41d6ad707fe6863cd8695fd7a4cc40fdbe56a775140a747b2c773d92bb9a0853c2958f087c01110a008332791bcc4c96e1c452a3b4f2adfe677f2b479ac5fa
-
Filesize
5KB
MD5747c1a561affad5652ffd4934002972d
SHA1a2b692818da43ae92a4739aef17217b10724c775
SHA256525b85fdf3f7fb5ba3e50ee271dbed770eec232212668ebccd6ed464db083f49
SHA51226f6a73d2ed2d82c02d474ad114d567ed15dd3d23524165719591548909b40d9e6d04247fb85afc05a92d1079689745d717dea9355f49b746dd02e51b16b28f0
-
Filesize
24KB
MD515ad31a14e9a92d2937174141e80c28d
SHA1b09e8d44c07123754008ba2f9ff4b8d4e332d4e5
SHA256bf983e704839ef295b4c957f1adeee146aaf58f2dbf5b1e2d4b709cec65eccde
SHA512ec744a79ccbfca52357d4f0212e7afd26bc93efd566dd5d861bf0671069ba5cb7e84069e0ea091c73dee57e9de9bb412fb68852281ae9bd84c11a871f5362296
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cf8c5f7dbe5fbb026d912f50af69095d
SHA1332ac5816fbc700647857d38942240ee0bf97932
SHA256b7c84bada4d853f156e7aa6375e6d54d3fcfe1a45c2cf4071a1ad00974052fac
SHA51278fdb4091a7ecd212a8708cc737e05ebc71e97ce99ec3ebedaf55f6d265b7110fd11a89c6317a8faecb370b752e1db4467d80867df5b2065dec16d7fe4d565db
-
Filesize
10KB
MD527ba0baed9ffb869219b82a2c3632ff7
SHA18b0a597892cf2208030ec63400bd5b8f83286967
SHA256ed2e1627a6acedcb1b21882a17629f1e5f710db72a7fce0a4e54aab45e8d61f3
SHA512e94cad5c4bff97062207762cbfc94562bcb51b51df5cc0be1ec410d41b473271266da23e566f2a90f5a466d17e8e5ac33f20ae37b555549128f0f6ca1cbae305