Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1805s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
18/11/2023, 21:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://h
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
http://h
Resource
win10v2004-20231020-en
General
-
Target
http://h
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\T: mstsc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1847152663\3867481604.pri CredentialUIBroker.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133448156362224007" chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3064 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3064 mstsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3064 mstsc.exe 4328 CredentialUIBroker.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4248 4396 chrome.exe 55 PID 4396 wrote to memory of 4248 4396 chrome.exe 55 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 2892 4396 chrome.exe 74 PID 4396 wrote to memory of 4496 4396 chrome.exe 73 PID 4396 wrote to memory of 4496 4396 chrome.exe 73 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75 PID 4396 wrote to memory of 3492 4396 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://h1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc9be09758,0x7ffc9be09768,0x7ffc9be097782⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:22⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2620 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:12⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2608 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3888 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2872 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3704 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3504 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4152 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2996 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2860 --field-trial-handle=1832,i,693339213976117436,11249225642929019201,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4928
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3064
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4328
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4241⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD5917e87b46aada59b50e33102d4e371f1
SHA16527636eec5ec354d37c132ab8022ad87176ae69
SHA256caff3fcb9a03139a9489bdbe62b52cea71a6e4c0a74dc5fefb659bc02fc11bae
SHA512a522b6224de2cf60a36aa558b40b1e98668eaf8fe72ad25a394fb3cc1bb4ab0b6456f92ab207c8e53d28835031c1c563ae4141b38f123104846b9a343ac7dbcd
-
Filesize
1KB
MD57496fe2cdf0e27cd45945c45b67b4330
SHA1fa4a1ed912008e74a8a57b7e59ab0ac4b955038e
SHA2566e7c30bcf2894d266e7ed9ab857ac8884d8d2c037925c838619f8f20563d795e
SHA512f52b47be2ee6edcfa6f160a625ddf60bcbe976aa320739643927e0d7a00979cd5420e147c500f40971429e9c619d37390485dde31a87326ca160f06ab1a32b43
-
Filesize
2KB
MD5db3c3881239593d7c8233d477bb43b42
SHA16cb3733f7104b45d4390101e3486a60f0fac392d
SHA25655ccf94b9d342b61a966c855beb1d9bdf197e75da20dfeac0a4c3422a8875725
SHA512c748fa3970fcab6062774d2da1189a6292dbecc33fa8dd3fd3cbbc55e2546435ae166ed438b57e21ea70b3e4d0b3b3721a7f5decaa415fe023a50629d3ac2fce
-
Filesize
1KB
MD5fd21b381f2e4cca30155245d3fcd1704
SHA1043da379e38f182132ee58f991f5e939efa58366
SHA256f610d68b2efc970c38b63c1b0390df3985c72db436be13c0ca6e46a43104894a
SHA512159c96e09f792192eb8438d2e8f147d5577b5dea9eb096c67591f9f235e672b0fbd189f8d489836efafe453a090325d43849685f6e45dfdc575697d3fc542aa1
-
Filesize
371B
MD5842b3bf084a4c57d66913ff99b9ab051
SHA18f692007b6aaecd055417836ee475b4eb26f6562
SHA256626816cf24cf84ecd724f9341f0155c94415119fba769b8dee638b005889dc15
SHA5122bfd549562b31827785e12fc4c8927c6bf8d597a3070c6caa18732909a0a215f5f25a1ff8f8c0a4b766ebf08c512a211a9dc124d2c20142306f67d59f52780da
-
Filesize
5KB
MD598f55e8c4f3ecf7229066a8817398c0d
SHA167fd89623a0d08e15828aad223369b88ea51d0bc
SHA256cd42df0a0d79fc1a2d3460fc00ae3a10c8e471c7a4e6d52d7122e21908377229
SHA512b9dddb266af1cc6fab5ef520f7bf9419675cd9962cf1f97c1dad345ea64603cf05214786c86d20ae0f4ca26c87e4e340a3ae6d540a1ed3fbde9b28a51d8f559a
-
Filesize
6KB
MD5b4987f65419d74c1c619d095eba46ee3
SHA12babd16c86de0f2bbcada462be879e9f5447137d
SHA256a48687ff8b15121a2e7f42d8bcaa60bb18e57e6f156452935e6c476f772c0b91
SHA512304938981c4b45057f2c9aa04045940c1c2ab7576063815015555359def52e59da835e75bc43f74ba89681e3f8ff2f40fd9fe4b8469fb6d7eacdcbb7835ea76c
-
Filesize
6KB
MD5fea2b918449c6184c3936c99c311e594
SHA1a3b22ddaecbfa44aa84eb3b9ab14a10c30dacdb3
SHA256769fb1aaddf7861d33a7d0290a0656a54bad54cf7f2e0af9889006d27554246e
SHA512eb2eab5f679f821aad07c0badf6c0bde8d31973e0694d2693692e06fe25711294a69ccd54e1d4752b1188da7c8bb94dc97fd5f5adb59103de0a488470be60aa4
-
Filesize
109KB
MD5788d17660081e57241b1761015518630
SHA1b18cb94c70911aedcf93dd49448135afe5a0abb8
SHA2565d4d7b686a1c1693d9da62b9134103cbb646dcd8b9abb39994af3749d614e5e5
SHA512fa679b1cd1b729fd87faadf6ea4eb824ae23c4c1dbaae33e1b37d87118197f03ff0d7e8be2424a3bf30b1c175a75d6926786dda025bdbe890ebad1dc9c4f13da
-
Filesize
94KB
MD5e85269b052878798c5a6c3b8ed820cce
SHA156450fcf0808b7dfa1b4ea443f2cf611291d1cac
SHA25662bd8fd1665a0854385a704f92797868dd68a1aab3351c5da8275533fbc93690
SHA51224880ec8cd5b3129e4e1b9165717d4a7dc967043fa9b7ac66878993d8ade2547597cdf66262d6ae4821aedc5be3ef65c21a2e3b0b3e3eb8488ffbbfd05560809
-
Filesize
91KB
MD5bc32e35c9cde8321a13ae5841e266d93
SHA12705afce875a6d17818133b552a6d77a89c2052c
SHA256cd27e8772218466d181ea482c627336dcb5816b54227bfc6d609cf8d97968d21
SHA512255050457f221ed7c2522efdb1349dbbe26b46173d9a46e0c6f0460af514f9f8f3916ef1ebfc0f3d445cfc2424f6665fec54d526189996c1d8b1c67e542914b1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd