Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
364s -
max time network
378s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 20:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.downloadpirate.com/aescripts-deep-glow-v1-5-7-for-after-effects-full-version-free-download/
Resource
win10v2004-20231023-en
General
-
Target
https://www.downloadpirate.com/aescripts-deep-glow-v1-5-7-for-after-effects-full-version-free-download/
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449863161437403" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 312 NOTEPAD.EXE 3064 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 348 chrome.exe 348 chrome.exe 3196 chrome.exe 3196 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3588 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe Token: SeShutdownPrivilege 348 chrome.exe Token: SeCreatePagefilePrivilege 348 chrome.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe 348 chrome.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1972 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 3588 OpenWith.exe 2244 OpenWith.exe 2244 OpenWith.exe 2244 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 348 wrote to memory of 5072 348 chrome.exe 86 PID 348 wrote to memory of 5072 348 chrome.exe 86 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 640 348 chrome.exe 90 PID 348 wrote to memory of 1120 348 chrome.exe 91 PID 348 wrote to memory of 1120 348 chrome.exe 91 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92 PID 348 wrote to memory of 2516 348 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.downloadpirate.com/aescripts-deep-glow-v1-5-7-for-after-effects-full-version-free-download/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9069d9758,0x7ff9069d9768,0x7ff9069d97782⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:22⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5200 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3204 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3460 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1728 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5660 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3280 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4484 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2924 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6040 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5864 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6328 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6196 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6380 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 --field-trial-handle=1876,i,4365436366424397637,6753795729417709107,131072 /prefetch:82⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4916
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2520
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1972
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_DeepGlow1.5.7_DownloadPirate.com.zip\Deep Glow v 1.5.7\Read me.txt1⤵
- Opens file in notepad (likely ransom note)
PID:312
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_DeepGlow1.5.7_DownloadPirate.com.zip\Deep Glow v 1.5.7\Deep Glow.aex2⤵
- Opens file in notepad (likely ransom note)
PID:3064
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5687f9c03f4fd26bb8d4c28fe2b16fed6
SHA15e5b3d0febaaee4c55b31927609daeb63a7efb1f
SHA256ed158facf3628470df579b7ad8c0454c7a4c12472d98f1cb15e1541747a970fa
SHA5122a5aa18adde85f82dce6198cd38c3b3394c728af68ba1bb6fa4a4538d857c118d220d03e3005584aeffd92f91d45592d08f190a4ddd903c7e6b4ddc33948c927
-
Filesize
552B
MD506b1d9c10de3b9465598772e6825b367
SHA1751c0fc2b90bbf89703d0433dd899222a9c2403e
SHA25638aeda71583083ccd8a6c781c45efa11174265f27841abbcc937de65b750a5b3
SHA5122c4b77f53293192c7d6dfefb9b08f851decaa87651350f01599d4e21902362149723f9dd4d6846d4c32fd06168bcc069b04c2427782e8a986483c069ba3238ee
-
Filesize
552B
MD59fbaf825d135c4b4c47ab5d7694b7180
SHA183e8ca5fcf39cf49b500fd571791f4fb4de214b1
SHA25691ff5e157d5a8d74c2c220e8318b40795f011fb579c2730fdf064a195eda7371
SHA512324ea32995dd81c4d54f0589579e3ef8dbfcc007bae00c9498ff317ff07eaa44f444893d2f6a42f71ed05f6533596fba7fdf1fdfdc53d635d3bb12502cbea943
-
Filesize
456B
MD518c41e618feb1701f7137d2e06c6bcb5
SHA193ec221ba8ed851463dfce17d685b137474a2af0
SHA2569700cf5f8b775ae058d9dc477437da3cfd973fcb45b3b95bf6de6a5fbad20ad4
SHA5125dee81d12b1fdcaa627b668a0cdc3b3d903096006234e786ea3845142730be23a0ac4b793284aeb7b820d84bbea31b0e79fc4d2ce63dd98e53c422ce005799c4
-
Filesize
5KB
MD57a2f601355c60871811f59071146cf51
SHA12b8fd0f47f07d875a6a5d1b2d68dd6e68a1b5f58
SHA25685e3d1c95d07c7dd7f60ac8af203d027305ec288d69eae9ccc1ce7afce7e6c0b
SHA512958ed74af921751a01008e68e9217cef6cf55ced1febb939f229e817ee17a29afb8388c8d2f5ed00e9e5f6409f67226eec6511d30009e5a9d8c8abed4c8f5f0c
-
Filesize
5KB
MD5f49de279f7bad715fe94613d65a1fe38
SHA1478d300cd212a51dffcfbd95a51349b3aec2adc4
SHA256dae83746f46a0d38a1a0c32420ceb48a63d970f895826cf055cee0dc72df51c5
SHA512bdfae239437bab7797c8ba9740a1d7604287669e8a80727e1d1f112798fe753c9914d89c60987a9710998b0ba7e9af320e5ef554c10a337317d2e6a6b247a6bd
-
Filesize
5KB
MD50ee426754d389828f9281a8adadb225a
SHA1c7345f0a79151a96d1d9f1b5c729405bb26b4894
SHA2567332235f8da1bf14d992bbe41cf729307a89864886c7fa1573fbc66600cb6b8f
SHA512e1f81cca6f2c8542aa9912a1535411dfe1d1dc2d73b5c7c964432fff4b75500b4d9df05f7ab121425bbf7828b8dbe9d1d69854cb9d3227b5f473494468b537ee
-
Filesize
2KB
MD5f5873019c61028aa142882f6eb9653f5
SHA102a516974d5fa37b5807db7efc663c37c108073d
SHA256e0a5254ecab4790822ae9fb01404d0f163aae6a4112e0b83caf2e4323f26d4e9
SHA512cfea20675ca4482f2145c9c283b50ed471323518ffb00c2e345e17bd55a4ef89bc3df67b2a1f1d9723f5efe148b9078cce96d9dcf348b7bc51e2f43642196eaa
-
Filesize
2KB
MD556de3e00e7b1a33a509f50d9e59e93c9
SHA1eb4992ee10c8bd56bf36696ed2348b8f04511574
SHA2565700b43660aeb883a5fe73dc1e7abff51f62e01efc03709e696b85c9f0772cdb
SHA512bf33383e11da85d92d323773c3a99f046b6747474a26846f700f45c9f673de7e2bfb91e4776687eb17db54608abd488f97b75ce05bd233e5bebac94b65add8f4
-
Filesize
2KB
MD53ee1170a87f3802168c98a131cb00f85
SHA119e878699fa0e4e9b5af3f643040810e5ce0e371
SHA256a18845e1b48db5f3204392d75e07e0a5cfe1f7b413ee8addac9806c2a31f3ca8
SHA512215a3136ba98a9994ddd7d62573e07d88ccc24b33c3aed36ed8f502d749df15e11df6a01433edb0cdd74309db32ed538ca020948f811394fc75ce01969a33d08
-
Filesize
2KB
MD5171010f1f7b7a65c507e5ba6da07ddde
SHA181551c12fabf385cebdd5f3bfd08afd6eea15f1b
SHA2562803f40d07c41c34c6b0eff54c2f1bdb5e3fa45a40f4452ec2de57376449e74d
SHA51289c544f2d45ef27ed2e3e39e686f1473e9a7b85156e9bb0f0ead5410a25582ec56386b0600ceebbbe79ca305a6a1553848c40f0942c211b32271e0445cb251a3
-
Filesize
2KB
MD53b197b7f32d59d275367fade75a80668
SHA152408123b20db8beb0ed7f289de8892e98406b1f
SHA2563735605889ccd8230c6ea1cd2e7a35a4b83109c040502e7aaea7efa0183b7f65
SHA5123f2e965d49ad5e83f605df0357f47e7b844151dcc53bda7b540db7e21e15106531c99abbc0c5262d9bf431fff16eb6f23f025aca2ecfb912dc6fd0ad5dd9548d
-
Filesize
1KB
MD5b9ea65938f2f479ef40e3a3491f6a878
SHA1ee512068d177de72f451a5983089585cf7b2a31c
SHA2563f5cecfd7b6fbf70cdf572e1a60ceac9d70a142d78f2af6d78f9b295d2e980ff
SHA512e81f37043e981b9487926128f31f14367ebc4dbc13f257cf24c778effc3b99315407c2cd19ae02dc2c314efe31bf2dcd7438e0aeef3fc1a5c08aa94435073b1b
-
Filesize
2KB
MD51367ca436bab5472f61c48d12ed46cf0
SHA1925616278258fbe67849925fe51b41c121966d8c
SHA25604acc8f1926e1e2b886043fe1f98bdf1656b8ced2605ea06608435b512f33fda
SHA5123e66bf6abe1c4aaf14ce01daf3339803c79c809f822640c32724fa94ed974fde1225a16c4e64a33409cb171a02e65eb306e5de5f3540b7e3de7d6b3c6c133e83
-
Filesize
2KB
MD51a374671c388c1ef8e8ed2d0a0aad1e6
SHA18f61e08cf44e00d5341fc70e9e04edd15dccbdd8
SHA256658374fbc5b7207f6e404db05657934a9b5020203529fd2f2cb459f69c59a63a
SHA512a0a04b8f1007fa37591896a4d51c7ae1876ace8a5d3538ec02c0e94c9cebc0d03d26f153947c5522010d413c655ccf52931e60709e4f88691bdbeca7ffbad7bb
-
Filesize
2KB
MD58cddbf3b4da5487c8e8c030eca8e683f
SHA14238d618ece887be5637ebe3b6cb539d764e2d8f
SHA256942ecac247f4cb69fefb6cb6c00e6dac3e9d11a1e981d40f85278225e8a46fa5
SHA512ce57ca592cb40fe670a62ce00cf680917094f0acfb000e53863c49f082868caba8df44454d4d5dcf0c6ee321e23edb9ba27c3e5cd1e45a4e300324b04e52f88d
-
Filesize
2KB
MD53b56d4692d770fadf06332bab020987b
SHA15315fb0ceb2e53f0e9b63a8d4a272741f32adf21
SHA256717fd8e9219ad277e8e3201fc2cbade3e96f1634ed41be75aee49ae195215c57
SHA512894e26090974dfc6a4b98bd05572549699a940a994072c4ddca14fcf2ec0d93d6505f59f96d51d4591f84948822efa74e303b236fa88065aec74210bd5fe25f8
-
Filesize
2KB
MD5798623b13c2a847d3a4ce369b9126914
SHA18245842f0037d0f81d9abc9a099596b8d00d3751
SHA2564ae40064003b077a989437411c09e2680f5f45fe9e054c0a34f8f85bd9d5d287
SHA5122d3f6f04f59668b7b74d2abf81efdde7fc8cfea8170fc674ea210e725c917e21e68c32d8574ff211346d2380a11b38b92d581da3e4b2b3d46f378d135f125f45
-
Filesize
2KB
MD55168f98817e585af73224243162c8798
SHA1304b910e346e7d456e2ad64ff5838e27711c629f
SHA25690db9c2da13ce65ba9f047ee27569e13dd30668f7d8a7401d02c694adad939ba
SHA5124100f03a1a41d18f872d1609082637f320b9059a6010db88f020524596a193a92d70b59a750c64b8e9dbf8ba8d0b1e24706c653f3e8b271478b0c0fd014f539a
-
Filesize
2KB
MD57b72a2d52b72ac83ba7fd6060dd53fe3
SHA165d14fb30e9c2bb9602e3d183600d1c1bbc53462
SHA256f7991b5d26f259b93eee5860faa73011e39192453cd493a5512d0b4d824b4ed5
SHA51213a1742028eec14111b6406eaffd671a3952e41f4958a1d9dd3a9b0122e365cdd0fd6cb6ce8a998ab5b1e913bba1d5c22fc8a5d231bb502677e57e8ebc21db8a
-
Filesize
2KB
MD5139d7c68c044e95c90a9f538999ca714
SHA197d71f4b2c3d25caa3b6683bcd30bfabd88c77f2
SHA25637bca7685279c9ecc4352605679eb96f107d725a3960e395ac6357e17b65ada3
SHA512768a8d4046872e10d3e6e473009ec81ac4c10f324e52d38e901dddb54c60f5f1c234c988152ed686ab4043fbcee657d8f65328339932647c711345b0edfbba79
-
Filesize
2KB
MD5c92d1878e4d126f2282eee7a99d921e6
SHA1ffb5ad78d41ddd7a08051bdc8712a5737fa23fda
SHA2564d408c87c11f660fbc84673d9dda3254534c048054940a2d2282e14110f54ef5
SHA512b2e4727cc0f735b9c28fc0954fdb3be68a71be327b43c9136731a37247af657c9540a54e8c2f5b9d6716637d16240ce83329c653e929effdf022601d3ee840fd
-
Filesize
6KB
MD5b0e831ce4d47544980075980a2a4154f
SHA19b721d0a7efd0a147cf5a7d7d4aea15f5f5fbb48
SHA256af13b7a9022660aa0fa013dadac8ecbd72f9fb8c5d8ae92c1219aa64b1f575e2
SHA5126c6ae035d574c83e13841c46a781917fe3cee1e0f772255971bae070103ac62343a721ba65621f51964b9d476e9ce91704b469844a347fb31bd5d4842a50c21a
-
Filesize
6KB
MD54d18d05a371dd008e47177987b2e7d63
SHA1d2538e6a1b2ceed949c3e50213fc796e261a34fd
SHA2569898cc3ef61ec937a061ce645690ad7f576d78a30713a02c2fa5661bcc66077f
SHA512437a783c8beac97d9e7045fc735d84437558fc93a01a736243f94721f07d076817c97b57a8a3ff0365682d86bc864f152a9069af7b908885120a01e0f077941f
-
Filesize
6KB
MD5c10c9ec1bf3952329fbf2a788f28b853
SHA103cdfd561ddd0b11f334abc985a2cf6ad84f0702
SHA25603e045652a6b508747b55f420fc05d5caae7d4b9fbf104561f110271ed607038
SHA512dfe9d730e95e4915de81c9c879ace62d10a8595736fdc672d74e63dae785fdfbe49b4c254e791dea792b8ce304574376e6e5bbee158d87a8d4ff781b7ec2eed2
-
Filesize
6KB
MD5ea8dfb50ff85040f8d18dd4be02fef68
SHA132efaa0e8a5c923439f77fc9b305d589dfbbdee1
SHA25638c643e2a139fb80be67d2c9de137cefebba277afdab70a7648b90dc43af3ca5
SHA512e84dca1e1f55acb7b1e94fc7c239986170d0979f7f8702650eff599b8bbd28ccd852ecc89ff4a0ce6bd35bc0bd0f868fdcac2caed461afcdfeab9763a5ca2738
-
Filesize
5KB
MD57719211d4f67fa8581f2cf5db721833d
SHA1293932875c59fd427b6101c05b1bfca75f017e47
SHA2560ec07e791895b0a59563c87449d2d4e32306fecc676cdaa91af7954ab8fa68fc
SHA5120c428882893547f23d60e3282a6c58f34899a0bc2af6fb3ab0f73535db11c797c5572f79e9fae73d92bc658e1a782bdaf4202e4aa27d89f427cbfb8527f6bb05
-
Filesize
6KB
MD50a320541178a09495a7052eeb83b8fbe
SHA145d1dca9c0a04ee81b83cd8a3cd1477648c5b3dc
SHA25654bcbc7d202873e5b656a829c9c832d0e19acd8a04974fdb53a00ceee7f59807
SHA512552d401d874be78bfb10fa6963b9293f466c77ed9339d7ad6ebe00b658f7f8f978978822eecfe9d870836c8bd0b3517d6bf069d00d7080a1cec27d17479380f0
-
Filesize
109KB
MD5c5f4346664560dc0ae291b76b6a76867
SHA14d0be45513921bf3974eb923cf69b4a1432a7c23
SHA256a922734e91b45d84763736de79837099a37ac91e8329bfcbb6cd8e7bf18f1010
SHA512e2be2458943232834eb615df215c52f516ec52b0dd9601c4fd5c60116afadd0f4a1ab10e2eb4947e853884a341514a300dc8ef20fe76f83afea346705f57d2d3
-
Filesize
109KB
MD5928d72c26ff348ed51c320a842d6d87b
SHA14fe7a084f44a706f747a84034f380e444c674a4a
SHA256fdd4524871e58a0b0f59b6df75b5ee60a43f59e53e8abf1cc0e233e087cc2d7c
SHA512da60754524ba26d4ef0d50dff35dde88a023da8dda95fca6a55e26b1084825905f4d6bcf519defda19c0e3a7c4573ff6b3f941c56199134a6fb9f719913493af
-
Filesize
109KB
MD5c9fefec9a59e98a2cd68ef3a2158717e
SHA143fb665b38f63e714c881a472626627f8e3e8482
SHA256bf627f3cf3f0c94f4b9d4e0a7bf1f7b2dd647b39cf439133bf143ab8892d26bd
SHA5125a1c530aa98c07abc7d70bd40c7d025b2b4dbb12f2b45b359c66b5a0708c0879548b6aba5727c8160985de1469f4b9e04d72a39acd3caeb4352efe077a98417a
-
Filesize
109KB
MD5ef4a6ddf05ffd60aea1610ae83bcad79
SHA11fa4c008693de12b95e0796592cdca8ad524fef2
SHA256dc16303df284e03912e271623630730883331ab62004ee37c44f11d7640b4f35
SHA51280663650f38d0a19b54d8bf4a516942acfff366c32f3206f90a94fe21eccdba35e61a02933e523b3b889495f104fda71710d916149b67c18e1c67661da892311
-
Filesize
109KB
MD58377a727694eb4258226183d7b9479c1
SHA1ecaa4b3756abae7479c7497ff50fec998a3097ed
SHA256dfd8f9cbde726e5db5914263ccdf1123d826adf0f194d4e84bcb2786156a045e
SHA512b5936d1b6172d3dcea60623bab0cc6c849b3e2839ccce7d7ad099d78c1e4f6db71e7063ea71a308f9eee61c8fef73a079f9d493dc514def359b48d6567ad39cc
-
Filesize
113KB
MD5811e07bb46662b522fc5614a492889cc
SHA1225a97520fd64041634a5dbbf6863c3f2ccc36bb
SHA256bbba11fdd67bdf9a9d4ce6cb68fb85b92b8a5c7874518302bb060bac5f09493f
SHA5120aa1e57c40093311cdc1b47118cfca0075cd09cef6518f370ae5431d0dacddab4b5c9734a52de5d192cc71fa22baa148e94ad9b8e04a7d4e70f6b75bea26cd6e
-
Filesize
103KB
MD51d60eef747fdec11e72b2384aa2354d6
SHA13825fa9aaf6ec4fcf6a07f91f82aefe6723bdafd
SHA256fe9bec35b0eb6d692e6729b19b31df19f4b292182f7b7502a168aa49d5ea387b
SHA512ee499bab454f9c47fb86133487dabe0c391c5ecbbc08bb660439ea9c2c5bc59a19cbcc77dec3a6bee8e8b4587a1b280ff68e3ba789f6abbde45bbe26c9b4d5d3
-
Filesize
103KB
MD50a1090a7e54482795310e0bd5cb04f98
SHA103d6a6686655bc90977e94a1005cdab494728b1e
SHA256e99572035d28ca56c6ec175bcbcc511d04622ad4333196e6075af3204d0f2523
SHA51237a7639acc4352203fe6af82280fa75196ed79ff63c2774083dad8648ffac441fdcc2d92e94252de4c7864deef08fb8f02f5320a46f9d0eabf31afdb831d1a0a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
4.4MB
MD530e326d53465782d681a909c53ad52e7
SHA15c8027c703630fbc0347f5bf1cabecfe629dacf3
SHA2569650e423393843e08ef8e38f8a99eb836ac215ff4d6ce3a6119e09ef4ceed800
SHA51296b9d4f9abfa4b13d62259aa6f5876c4c4edb871d530408a7db006b9114f8c379be16ccce62be263a8c81652d580cc73dc50bec9da0cb8e8623d06c2b3ad3fe5