Analysis
-
max time kernel
214s -
max time network
225s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 19:27
Static task
static1
Behavioral task
behavioral1
Sample
NeoPerm.exe
Resource
win10v2004-20231023-en
General
-
Target
NeoPerm.exe
-
Size
26KB
-
MD5
6a5b980937c19397ac422c61c7ce0529
-
SHA1
cb8589fb79e22f1dfb8adec62e1f5d1e84d023fb
-
SHA256
ac8a06d6db3b9b97f06eeb0a0252001de591ee1f36b1863665292d0b470a6491
-
SHA512
be76ad62812fbee2e7791f5abf5aa572bf117c58de3d15affa5bdc1a7da159a9a939086e7e5612d3ef47467efe08f0f0dde096c54e92e53fcffcb9f5e4528643
-
SSDEEP
768:dsqQ+CdcSTaoLtpqHMThbGCJTVGsrK3tYcFwVc6K:6qQ+CdcSTRLtpRThbGCJLOPwVcl
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 916 winrar-x64-624.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1332 4740 WerFault.exe 86 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133455005251513610" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 1116 chrome.exe 1116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 916 winrar-x64-624.exe 916 winrar-x64-624.exe 916 winrar-x64-624.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2984 2088 chrome.exe 103 PID 2088 wrote to memory of 2984 2088 chrome.exe 103 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 4252 2088 chrome.exe 106 PID 2088 wrote to memory of 3728 2088 chrome.exe 107 PID 2088 wrote to memory of 3728 2088 chrome.exe 107 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108 PID 2088 wrote to memory of 4264 2088 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NeoPerm.exe"C:\Users\Admin\AppData\Local\Temp\NeoPerm.exe"1⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 10562⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:4376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe1dca9758,0x7ffe1dca9768,0x7ffe1dca97782⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:22⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4736 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4656 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4952 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5588 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5360 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4972 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3164 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5732 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6088 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6124 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=1760 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5476 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6624 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4912 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6632 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6640 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5652 --field-trial-handle=1884,i,9435266158517611526,8091759423638795109,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3384
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b8 0x4f41⤵PID:4928
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3712
-
C:\Users\Admin\Downloads\winrar-x64-624.exe"C:\Users\Admin\Downloads\winrar-x64-624.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD55df428e599663f66153110af033c9ee0
SHA10fdc013c9228cdac1ecfac9fafcbf1fac614dba8
SHA25675a509dd32c136bf7a90cfb2d6f967d946c39f41c89eef54f0029beef77af9d0
SHA51280ae4b69f1fcb63b1202c5646afc630f098321424d5b01276889c566b6428b3d779804b24555324d5291b7906d59c9d9cab9656fdc19527d4ab468468269ba50
-
Filesize
192B
MD57104beae1626e2a031d3295bfca18471
SHA10345019e77b5a6c59136aa3a4b10af2596ef342d
SHA25617ef3b61bd63decb01a4e9a582d387c588dd73f5a9c85177733b2d36a980834c
SHA512bc784158a2af268ae67441ff5be66ae31f4bd81fbeeb53c0d2cea4e5138f0f9baf9231267a2681f399b04a065ff2660675cdef2c49cc2ee0f22a6b21d652e077
-
Filesize
456B
MD5f1f4dd833ba57d326e3990f709ba33c7
SHA199885e8545c976c9002465fef2d6d78befb30609
SHA256c80cd526488fbcba5501b463ad0e919c46e5b8297c20798ba03122257d720682
SHA512c931f036e66e54611223a19c0a8470bffc307b4ca1ce69594afe07ecd91a9565bc983ebe506047661088915de4f989be97bbfab296fdc7c71b6b7789b848ac67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD57a94c2000c7d5b95f2e2eaeee43ba32c
SHA109ba67896baaa1ec31f85df0d71f103cc68f61f3
SHA256f678199f7740f6b0a200d4ebb3e2cf8c80667f08b19925a4b8dbfd0400c7e073
SHA5122b0e48281882b5094aa1458df53680b8b0d63c2c93509d9ffc322a795fb4f36236a3c667ad3faeba31088dcec04b77925fa09a05cb08049679be6808bb3912c1
-
Filesize
2KB
MD5dfadef27f851d29567da026bc2a85386
SHA1cd41dda19d7b1a4b118a91156cc25270c39ce7d6
SHA2562a8b8f250df4684b3178008d45ad8ad9a7a5d119f98ae904a3dcf4abfd30bdee
SHA5123d895ea4447cdeca8becb4c532310501d765b6fcecd807202fd54ab1f6305adefacc0f8a0a588e52e4c81608b8d34db646abef3565f1e4455e798a4bc48a2903
-
Filesize
2KB
MD569ca228c91ce04bbdb33371a6c9e567e
SHA1f17991a42c23cfd725a3c7d1e31a09780190da6e
SHA2568fc807532076511bc6b6ce9712d07010bc0e7152e22514a60a8301b150f4246a
SHA51274b181a5bd31264bd0a0351ce29e0f602d5b07da0b5f1269ca57ab21eb6313627aebdafed10329f8ffa2526636040072ca0a2c9eb89a33f56c8fa8a7f246ad48
-
Filesize
873B
MD5f13ccd34f46dc8e3d5a090a94aaa205f
SHA127f35fa95adb2041780241e628872c214229c838
SHA256480732743b15213c9998df2ce908c55e9cc5d39eff1c8bfd9e149e26809e2e1b
SHA512501cf31099a92c3648da44d8d6434448b402516a02c45970610df3227f94623263bbfcdb029f7ba58ba8a750eae197b228fb4bf4c74365639ed5c37324baf9de
-
Filesize
706B
MD505e1c1dea3c9534b2172d78d5bb7660a
SHA1c315b0ce5a04cb27c3aab1ea47986133b92d15c7
SHA2564faea752d76868c457a9e906d87692aea2d53e0c405b069db6d3c0273323b2f8
SHA5123b18fdb4db1d0c42d8c6bb5dce2b3e39e72b378f0783725c0f35404762cd8038b49a8c88e30ef207723e48ff81d3a62268b2799780b03958c615a4d4baf77355
-
Filesize
873B
MD5634c1f8c7da46751ffd8212aefb86af6
SHA149a97066488b58a47677cddc2fe1f01ae8aef154
SHA256ffccf7344ef0362a05f7dfc0b53dc4e6d679d80ec93814645d383daa8ad61108
SHA5128dcf359574151c001ecb45f53059fd3729523f091ace65a6a89571463deb1684168a58293b453e723f2932d1a3786321fed73b023f2bd1975dafa53117f8bb61
-
Filesize
539B
MD586d7918779c1d79e6cd630dd2c2c386c
SHA12619971db61c83f6030491e605aeac039c4c3e59
SHA2564f3f5aed48d4359047e1ab6c2bf380cceccf984b466861525c1a086aa43dbec1
SHA512730554ef6727fec638dbe19d4f08fd49353c90d1cd481cc03829c356ac263173411ffab8356d6302dbdc7f61bae37d6f16843ff900fdb501d168f36ef3ac0206
-
Filesize
5KB
MD5cd764d7e4e9197b8b8bb7963ac84db0c
SHA1c113877030324aa5c8e70632661c71b48351bd43
SHA256ed695989fa0bc4b8c40a9619062fdbe2eef5914f675a458e3c63e86d3b445107
SHA51203491a335f518c16b01654f39ffbd5d2101eb484aa3a1c2971233a73f22d9f553ae406146019c19dd75c1f85965fa38408b53c295eb2446e279e8b1f2e203b00
-
Filesize
5KB
MD5d08f895a9a1bc3cf2edb395a9c5620e7
SHA13f126496cf8fe9062e0ff4d69288d061fe1e84bc
SHA2563c4b7b9dc00e2ad0bfaccf8c7fe317eb77db75481e2b9d9f8d2c46d6aa1e96ef
SHA512728767564706cd5459e29ed121604597351af755eae05d4b2eeb1be15a32de09d8b0584363d49c267078190af8c3f01f3ed9765247ee52222d90580756a9bcd8
-
Filesize
5KB
MD5a84fa1969bfdf19a5542225c15985d13
SHA176d34b979ef9201732d0c1aa029eeea9ec096a4c
SHA2566fb126219b153bfbea7345913e1ec18b83ab076740221d1bd94fdd1025498cf7
SHA5125f0673ad882dea224d2bc8c2cccc5b367bd9829809764daa905a580d6e16a2c7190f69bf30fc299a551a0201442407c3622866c4fd235d92cbf97cca325a48e8
-
Filesize
6KB
MD5a4468cae2164a41c24ef588bc982cfb5
SHA1b7a4ecb73db2dff1cc4289cfd0822ffb73a8a066
SHA256fe9ec1e1cd24cfd833d5f3343811926a05a83d5c3a23bb0f2118b18c61dfe197
SHA5127637410050fb8d105839c5265b121ec838276b51efc47f85eb98ba086e3df47ab33ca17fbd4e2c7ec5932f036519f5c150c7f324eaa6a318d1f2c1167d0317d8
-
Filesize
7KB
MD5799a09d414c6b3d0d6304a8f950a998a
SHA1fc8a3551f938d57353b046e4cdfd8b285a2db060
SHA25643069db64be7e8387211fbe609c2501806ac85ab0a7aef171437083e31d41142
SHA512fe52ef4a29a4d62c7ed640a3bac299f6a2eadb2633a59f4ad2a085605286ad4f9aa7121d143316737b09a52e370a1371e610800b63ecbbcec65dfccffcf2b542
-
Filesize
7KB
MD55ab6270c70a1fd7fc57919d184051f67
SHA137db8ea169b2078d6e7ced39915d34d8bc60acf5
SHA2561d92e782fd22589370bf81a65b4dfb8ffbfa6df39db78a57e468ff1aaa8dffe6
SHA5125e6f2a82da06e59ca964a5753b5ea9a40f388e36667cfc35a55330831ca7e7f5365cc07c886e787deabf8fbfecb43324552fb134f4202e98fb6f1b230ad6ff02
-
Filesize
7KB
MD51e8ae669c5848af709563cd59a1c36d2
SHA1e87b234cac51a99861f6f5aa8521be0c2de200b8
SHA25688d3d9abb30313880211dd0f3b143a563a46fb3a7dd76cd48aebc0ef059a6c94
SHA512510bddc8856c8c618c8cf6918955943e0fbc9dfe4777f4f16d1a22fd754d8d07ec2a2ae8bde44d651ddb3b313fd018cba1bd0adc3cad1aecc9a72e3065d22f20
-
Filesize
6KB
MD56fa5c0993a88373fea1ec9972e0f441b
SHA118ed8dee1b1fb4e27be067b7f972207cf83b1238
SHA256ba8ec3588ad8b67d17cf46e12065a3c17857e30a664e1dd8c3849a3a07f71373
SHA512889fc92e0ae1871961e0362df5291e0a75ba3ad16cbb5b5cb4f2473582fb032daf9e329b4726e8d038c9f5136b382306c2e5df9a6bc707b0867987b8b65413cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5a0284bbc780a6c9cc24dfe775384d4a1
SHA112a9ddee8acd747c1f92494564c2f1427c6715c5
SHA25652e194504830ba25931d50f7388ed267d8e1079804a00a20f8970bafdc431bb9
SHA512c5a58c9cdce8c00ef67765901953fa73f2d3e857a996c03a9b3b27c1018d49661df4d751f0c249654ed7c302842cfc104ece22fd0ebf8b7fdebe0bbcbdd8b88d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5abb04.TMP
Filesize48B
MD57ba8106fd129d829d86c787e15c36fd5
SHA1cfc862400488df8e9bdb75d8cc0912a1d9f5d10e
SHA256519ceb3bc4feeefcb6caf2f522ac2217d72bfc82a5820a2b313abe53031fa9b5
SHA5125f5bf033ce5aaddddb8caa29a86a22db48dd362177312cc270a489507fb79c778c58b9e75314b0bd988fb1f51728edb4a161330813ed4bc7f4e468c083cb542f
-
Filesize
220KB
MD514cc96eef55b9ecabc4fb14bcc578de3
SHA1a7715483555a3749689de669503d7c3c89bb10e9
SHA256a1a200be710716207d2a02bcad036a76bfd9b3e19531afcec603dd24ed0cea85
SHA512176df3181fe3288d34a1e2efd5525ba67d7687b697ab6a3a91b7cc7831024468e8bae6f7aa4f055e11338d3ae70017ff95161c45722bd27c55cd84f7964477f5
-
Filesize
220KB
MD5883dbee0f4070eec525ef48ee706276d
SHA104289c5e0bc693f1c55b7137392caa258a2e440e
SHA2565f41842d7e961acf3d9eceae8ff26f40d2cde2fd0b5ca8041e7feb6e9c0feac0
SHA5126e5f09a4a0b4c489677519d096c1992c9c13413ad3c512e651ef76938eb6bcc6ef710f2fc2cf79d2d20dcc9d70ba7a5fb3c52dfdc1247e13400c66814893bf37
-
Filesize
220KB
MD5ec3d60e2e299f32e95205c9c8e5b3607
SHA1f0e5d33d7c14eee7217aff29fdc2465114e38cb2
SHA2561c4a39efa6bcfbaa2b77268151dd53c2b7a2759839dc6068c7828676f0a8f61b
SHA512ae5ab43eed1afeb4f5acd1059b9f2f7565f1c4be0b9f3cf948d242d173aa2db5ad33b47a171ad2b4385acfd3021b379de0d76b563c5064ae2bcdf3c4f9a1f026
-
Filesize
98KB
MD5ed637e6a4fae2ca261b916af07c99e45
SHA13b3229bc89dc59a89b43918edca52ccf79122d99
SHA256bfeb229dedf53d1aa2da95874adbdc9323b76c8cceb8b4eeabcab998a298ed2a
SHA512ccce93223dd6b30f0023a18ccefcd4ceab807d4e4ed4d52857ee5b85552d65c365980c2bfb1766909bac41aa8f9f38eca637af546be570fed208310e817e43bc
-
Filesize
97KB
MD5194bcaeb75c224a9d5b95b1206ea659d
SHA1fb32e001c9fbe82eeb2ed3177d86198607834ab6
SHA256a21b73fa38a4e319472a7b02b4276b1e526bf0611e782e939883772e6481ccf3
SHA512b29ea0776afb3482bfca7e0e92523f6b29a23ee6ac4db812a8eff407d7709ef0bfd777d5385b4148c10093c195de648d8e982ad2a555111b1dce4ab5be44e8ad
-
Filesize
105KB
MD512c2511577c76072c134b2339b156c3d
SHA16ad41895e0e8d47270fadd1d34177387d7d45c69
SHA25646b77f21ea2692518b767ce7c778838bb0b53053ef5687e0009d4314fb99f06c
SHA512c983bdbd839b1dccb8f288eea32c30b7350a18c02049dee6e4aff24b7d6b364ee6ba4decada5f43703f9a7c917cebc2aba2784ccc2587ca08fd25770a95a9031
-
Filesize
110KB
MD5ca7e552732485efd90bdf5b9bb9082ee
SHA1d9dd23d3d54d4a53f04c79a674854984a8ac2a7d
SHA256a105b99d1b71f1483663428dda96de78336eeef58d9301491dea44d704e2f790
SHA5126c3116ed668043924f024884d84d036fc7844ccda5d473648bc45590e07335bef6d716acfa9c34a3093a59bb6d00f43435bab577007720b590d356b4e88ef562
-
Filesize
264KB
MD540387920f29fd640b783aaedc7337fb7
SHA144222f07e2f7d0eba7cdd35f9827e9c9e3899760
SHA256c74562f501bc1ee2eba3d13cfb604f621cdd48d638bcfec65cbff81a8153f560
SHA5123428910aa998e3a507f769562de104c13ac25830a4554cc0261ceebb9bc31d7f62889c9ff1e9cce52ccc3af6b57f57e4fc84bba38d390162b4294b533b8e8155
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3.4MB
MD515596b41dba42cdcce4f677fbbc86b6e
SHA11ed1e69e72028150f8562bff5ca1dd745874329a
SHA256377abc9d367e61cb5c4761bf48dcfdf5bcd3822f303e0f972d7f4c8295a2ea79
SHA512d4e0d64f71027ecc6d85479542ed682359b37446cb1dccce5fa2972f152e27f3cb91a8ec0dc61270bc40038751a58982d4678efb929a3bc6d3546e072f51a9f2
-
Filesize
3.4MB
MD515596b41dba42cdcce4f677fbbc86b6e
SHA11ed1e69e72028150f8562bff5ca1dd745874329a
SHA256377abc9d367e61cb5c4761bf48dcfdf5bcd3822f303e0f972d7f4c8295a2ea79
SHA512d4e0d64f71027ecc6d85479542ed682359b37446cb1dccce5fa2972f152e27f3cb91a8ec0dc61270bc40038751a58982d4678efb929a3bc6d3546e072f51a9f2
-
Filesize
3.4MB
MD515596b41dba42cdcce4f677fbbc86b6e
SHA11ed1e69e72028150f8562bff5ca1dd745874329a
SHA256377abc9d367e61cb5c4761bf48dcfdf5bcd3822f303e0f972d7f4c8295a2ea79
SHA512d4e0d64f71027ecc6d85479542ed682359b37446cb1dccce5fa2972f152e27f3cb91a8ec0dc61270bc40038751a58982d4678efb929a3bc6d3546e072f51a9f2