Analysis
-
max time kernel
55s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
23-11-2023 14:37
Static task
static1
Behavioral task
behavioral1
Sample
dildo rat=jpg dönüştürücü/başlat.bat
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
dildo rat=jpg dönüştürücü/başlat.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
dildo rat=jpg dönüştürücü/kurulum.bat
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
dildo rat=jpg dönüştürücü/kurulum.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
dildo rat=jpg dönüştürücü/main.py
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
dildo rat=jpg dönüştürücü/main.py
Resource
win10v2004-20231023-en
General
-
Target
dildo rat=jpg dönüştürücü/main.py
-
Size
11KB
-
MD5
bd80af0b8b748d5e3c04ce6707fcf419
-
SHA1
fed9b67696a6c3426a5f31cc49b401882a1d0439
-
SHA256
b50cc170e868fcab0b67cd6be586119f6e00f7ec35d72c9ef18e643b02337cc6
-
SHA512
eab74486af542fb34a2cb8efb51cc8aff6cc8906d5b4ef5d2f15476f4498c368e8b4741b2bf56f1ebaa6b0b0b800ef8b45bd527f323d4fc640a29c284c9fc409
-
SSDEEP
192:VLo1NxipNqpP9w3/ED9QVB0IhzhHZm8Pj8/LBCNt47RYWVBRsMDI/7BRB7/RJ/7N:RaNpP28xIhzh5m8Pj8jBCv47RnVBRI7b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Applications\7zG.exe rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c0031000000000059572d891000372d5a697000380008000400efbe59572d8959572d892a0000000e03010000000200000000000000000000000000000037002d005a0069007000000014000000 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Applications rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Applications\7zG.exe\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 88003100000000005957c98b110050524f4752417e310000700008000400efbeee3a851a5957c98b2a0000003c000000000001000000000000000000460000000000500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Applications\7zG.exe\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Applications\7zG.exe\shell\open rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "2" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_CLASSES\Applications\7zG.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zG.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2632 2092 cmd.exe 29 PID 2092 wrote to memory of 2632 2092 cmd.exe 29 PID 2092 wrote to memory of 2632 2092 cmd.exe 29 PID 2644 wrote to memory of 2592 2644 chrome.exe 31 PID 2644 wrote to memory of 2592 2644 chrome.exe 31 PID 2644 wrote to memory of 2592 2644 chrome.exe 31 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2608 2644 chrome.exe 33 PID 2644 wrote to memory of 2980 2644 chrome.exe 34 PID 2644 wrote to memory of 2980 2644 chrome.exe 34 PID 2644 wrote to memory of 2980 2644 chrome.exe 34 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35 PID 2644 wrote to memory of 2332 2644 chrome.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dildo rat=jpg dönüştürücü\main.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dildo rat=jpg dönüştürücü\main.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" "C:\Users\Admin\AppData\Local\Temp\dildo rat=jpg dönüştürücü\main.py"3⤵PID:2024
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7519758,0x7fef7519768,0x7fef75197782⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:22⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1384 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3236 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:22⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2172 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=1244,i,4524478979933705141,7011550124335737141,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD51003a84c021bd2bbd3f1be00ab228a28
SHA19ee322ba0b40d9a6edae9c928baace45589f6f47
SHA256ad18dfc85f9ec1d1594171c79569085035ef1e38793b76198fe50c3e65152fa0
SHA512959548140e338d4ffc1484758a5a61b0bde745365bf64ec217a23b37622b12032259b74393d6f58b7135e3446731799d78ff93c5a0e178b702c585b0120f407c
-
Filesize
4KB
MD5979f7242b4fe771780c2e34338ae58c1
SHA15286c4ecb3548bad80d7d29955802c5e406e609c
SHA256c9c658f9633d0355e690050b37edc508019969275ef5c37dd4fa2bc5ba5d7704
SHA512465e1fb914bcb5918f26fbff701569f153967caa2bfca40f5ff93baf0188fe28af910666c13134206b68b32be2e19d4c543f00bc1b0e3f5fc156a6be767980be
-
Filesize
4KB
MD52c85b662f4d264f221dad44780657870
SHA1bb793854c6e5d813952e555d582da69205f81812
SHA256f24a78f3dc7e6a1d55117dd43f0a8dfd9456125aaf98087b14f4a961cb7b0e63
SHA512077131acec423e81def0deec5c984fff4e4b3ce27fb2bf0543260d582f3b2524e83eb6f9ee77427f56336dc08effe5d157b60339d5c445244ff78ba4f355b4fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f703cf29-cfb1-457d-9e99-16de0aa0477b.tmp
Filesize4KB
MD52bf1525eea398333c1be87c024daa23f
SHA123d831c22af25ad866d50388a8fc028abd1ccdf1
SHA2568e0b1a7a5e797cd32b4c49b795731c0712f32e6b6d45a670654fc6e6214d5f9f
SHA5124a32c13e6f01fe7b3b1b69a69e872327f304abb355bb022435b0f84c8c7c6f6f2f2eec54b6bd7d587490500c9921d8695a3a984b9c12e60832bc933c4dc6d75e