Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
900s -
max time network
1596s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 19:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://!rYno1QoaobL@
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
http://!rYno1QoaobL@
Resource
win10v2004-20231127-en
General
-
Target
http://!rYno1QoaobL@
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\L: mstsc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1847152663\3867481604.pri CredentialUIBroker.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467968499309622" chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2952 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 mstsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2952 mstsc.exe 956 CredentialUIBroker.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe 2952 mstsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 604 2464 chrome.exe 71 PID 2464 wrote to memory of 604 2464 chrome.exe 71 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 2908 2464 chrome.exe 75 PID 2464 wrote to memory of 4860 2464 chrome.exe 73 PID 2464 wrote to memory of 4860 2464 chrome.exe 73 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74 PID 2464 wrote to memory of 2436 2464 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://!rYno1QoaobL@1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffbd619758,0x7fffbd619768,0x7fffbd6197782⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:22⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4468 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4476 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4800 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4428 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4844 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3040 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3160 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3168 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4924 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2924 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3944 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5128 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5284 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5424 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3884 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3776 --field-trial-handle=1856,i,8882544198218287072,11884847396410784188,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4524
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2952
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e41⤵PID:792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5b3ba9decc3bb52ed5cca8158e05928a9
SHA119d045a3fbccbf788a29a4dba443d9ccf5a12fb0
SHA2568bd1b2afcbe2fa046b0937197f1b2f393ef821ff89331f99754b9006f0114df4
SHA51286a86d370e96fa29c0c1d12991c2287936b400830869ff7b5abe4de6f32db2df782b626d724496cd6de27f8cbd32101ba34cbcd4c650ef11afa26bc048d68529
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
40KB
MD5929729aa7cff46b3dad2f748a57af24c
SHA181aa5db7dd63c79e23ccd23bf2520ab994295f2e
SHA2563c63e6c7fa25849799d08bf54988bfb3b77b1d1eebb1e55a94b64995850cba2f
SHA512a10eaa6f2708b683bd43295b9c3da5840c0eb6d8a6b9e1922a534270fecbc0dcdb4cdcc28768df292a06f6210885b510254bdca17e5b3c507b0337fe7dc3d743
-
Filesize
289B
MD58b981d0669697f525c8bcd7b75e1d4d4
SHA1903200f8a9b598cdfee4ef02c0fb3f726e03a8c8
SHA256073a83a1c82679ae829215e6230bd3cb40cd8dcd428d5e4c5fae5c1924827274
SHA51223154972bcd4247bf5590cdaffc576b0e1f1a9ae6f097ade384fdd63a443759ccda7823162524c67e248b841374ed3f7f6d914975b3416f4482d16ece011877a
-
Filesize
17KB
MD5b3d602f0291e3f16c51e7a3e6980311d
SHA103940a1be0d443bd294ba28ac9d9b55743d3371f
SHA256c364f26211ab650d3528a698e4bc0cd2fdc564ab7916ebecdd1f4b45ea6c8761
SHA512511f5afd7b11a430ef1c1e7c8916dcf86280b1c549d83b823681a1b625691b82bfa77f902201b1f055f392b396969974f98c561b7748d89ad5817904140765fd
-
Filesize
334KB
MD53b0f756ef5ca44921b1b616f6dea6949
SHA1111a58ceacd1e118fbea468a7b57aee4bb909d76
SHA256080af13ff8ba7cb439e06568b9bc8d223407de0534a756b000e3650237ef83e9
SHA5124972fc0670e531095d9ac2ede6ea8151cd59c2f8edec1a12acc964c565954cc9eb509815c3a76f8033e18965a69d64d1de1bed48b5553453a3b36f10bd24d5aa
-
Filesize
280B
MD52b734752ddec76a04dbb570e65de9230
SHA1e9d40f9a04be4c664f8b323adfd9c4bdb7f08930
SHA256192b70c78b838accacbd8189ce6d92cda257eb82fd9b84811e8f0f1233f5c2eb
SHA5128d7dde12c189fc1925fa2d3dd64067d1b7d3984d6867cb20d045888ff15daf271af1a3c8db6f0a6ed38d272e13f486aa20ba9e7fe4dd0cdd34dc619e75d21a67
-
Filesize
576B
MD52ed14f5b6026588f1e32503b57fe129a
SHA1e38bdbaf9eeb926450acd1570f2695a58e7a3424
SHA256f4055b5d9ce71ea2f2f5697de839df6931333dbccd3335dfb41bada2591c1a92
SHA512cbe986845d65a4cae73ec260d5a87944df95c8fcc4c36ef8fade9e404e86e184f8d587e7947cf6fcaea6aa6952f62db659c48c4f3bf60ab4a2b722d7a44da736
-
Filesize
168B
MD5a8aa80877821cd7d3551da9bb720f086
SHA1e85ac5f4db0d28669169c7a5a33061d8306d8f8a
SHA2563fee3bb7cdcd7ce1d84b65bcdc55d716237f4b42683bca8d0623ff318e7403b3
SHA512e190bb57400475e2e2b14915771f1f216fac1ea6e43a09dd9853d93bb708680d3565d502e43f96ae6352475930d328c4bedbd5b0e069dbdc08de1f25fc43951f
-
Filesize
264KB
MD5c62948cd91e5b6c5c4030005704ea40b
SHA1f73392d7820d0cf33594355719a5c6c5962cbd25
SHA25629d21401bbd6633ee134797f905dc72c3652682e64cbf92584a7a559bf1ff096
SHA5126372108c2ea155cd8913c6e707605b00b2e415c5b1738057b29b3281b68a9d53edf2accf280f5c9719510eaf81104456b63bc98e632bf1761b7a9330fe596fd9
-
Filesize
2KB
MD54190825c29f278b8b18d5a47a096d6b3
SHA148b17279ebff4af0a72dd2258ad69d12f8780266
SHA256cb080b6f00c0e16bd7178a8fffb6096fe1fb955f99e13372b51357a865bb4e78
SHA512d674ca452492d00e2a8fc68b0c86f578918870a20ef2cb239d4a6750b950c8f07e4658617614dd904ed65d58dd65a658b12ff1a7bfe93c230402238bec425794
-
Filesize
1KB
MD54327153998f685134e1027d3b94de92f
SHA14ead45d577073994c2fdf8fe9a2f083814f41bcc
SHA256b8d674f2dd0eb9b6d0637fec9bee26165f1178aaa63ed9ead46f3929aba37c49
SHA512c0a203ffa268e66dc0d2f29e728dd8d0cae9abd2f39cfe8d5deff968565109d2e48c98b5ec7d7128d92a4bd370d9f0ef3349e0030a6f486fcd165971889653d2
-
Filesize
369B
MD5fefc2b2514bbdfd6a00e755b8913dfb8
SHA175a4f17a06eb1140992ee6118021ba649ed33ad6
SHA2562b78c4513065841455ad6c3c1ff9732e0239ebce64236a278f47570146b7d171
SHA512bcb557ae7f3f9f14919471049650c767ed9d7ce958605038236dfaa39700ec8c0d882b2c395084091a4546cd3d2f263e3c3ef0f647d573004681afe759895239
-
Filesize
369B
MD56ed49f7a6d600a54dd02338d4f662a3b
SHA169f0f2f4c6792723b2f19e7bbf81d364e5df96f6
SHA25635948723cf0acb12b6df6b6965beb6877026aea4623c4345f989a56c2138f405
SHA512ef209aaebd21c9274c102c5815b34d09082310d8b86bbed2eb5f9b6a901b824fb987d354fdc2e07b9858722d1e3d849ac80dfdce57d732f5a5e7283559b001a8
-
Filesize
371B
MD50b82b2f9557d8ac3189ea72ab813823f
SHA174a4fcc92ef67fb93471c894bf529cd446f17c26
SHA25697b6b219893b78d3112b35b05bfb755603e047a6f91e471036714033db9bb9ef
SHA51217511775418dc691aee349079860d6365ee6fa01e84626c0f806771659796a4bdbd1eef6b020788db1a546fef9f2b8c16cc15950ddc50d0ded4e2a953de55db7
-
Filesize
369B
MD58697a4fa7890f1f4ba057cc59931561a
SHA1d5de7d7a4a2bf551d75ee7f7bcd7e4bcd2f19a2f
SHA256ae84e4b8b7ff8981949dbe5a19bd10f4aed47f7c06a43825ba93ce589cd0e5a6
SHA512f584faa279c0dc1fbc39ac6e139b462bcfe9e4da8b974098204689bc6fc9be91a4d1e43cb814d70e38ce739dcd75c359ba0c007a614ac593b526ab513f624196
-
Filesize
6KB
MD51a4bb575c183d6ae79fbbe98df06515b
SHA1e3064a5e577ea92dc858fa5587a5aafe68e5b236
SHA256759c22cdf6f89a8e0bc2f765e1a50b37ee573998969746a81a0d3d21b750f6ab
SHA5123b4ceb6a6d41b0e8394d03e6049c804067de60dbaec49eb4cd8abc16df2a23a35b7eb6d2ebeb73fec7d2273a9a07852759bd004b31435a3979ae651fc2fca57a
-
Filesize
6KB
MD5a59c283f91bf1d07896b5104a2158454
SHA17f38c7168794bc3c9ec75119063f4edc772d7d7e
SHA256f30094d6bdfcf527504611dfb6992b39aebba55a1d9eaeedb56415f348f99222
SHA512a0a24fbcd58fb91c99f53d7dd6514bb5e4e307c44645dcb05ed1e12cb4e06522c375ac7c7e9d36b2d08459d551e138476054ca13003c018e36f2440444cf5190
-
Filesize
6KB
MD5804d3694cb0cf6fcf2c91f85333ad17d
SHA113fc9581c4f9d725e175e9378a4251ad7bd917aa
SHA256fccc644d76e4702e61aa1e233b687b5f39d05b5a14fe61d9325488270895b684
SHA5120b6ca61fa905657976603c54ba0c8a3a24fc8dcb1bcb4b029bbacd01327de0afd06f5dae8cf8fc15f36e86ece79283917f790b3fd38562fdd39971e4c9cd1d77
-
Filesize
6KB
MD5253df7b4b8840e06d43f819b02506e7b
SHA14f52cb95956357f18dcfedc8ac6b2529cfea2c1c
SHA256915281bb85c20263082d152401b933370784e2f590432d05cf0e43209e9c1328
SHA51259f9e43fe73f142e176107eb847b23d603144d7b26509ac862eae5de5b70f37b92f1b0d973eb398f95eb86d56a9238e2f7352113ec654e6e0308c4d6dafb72d3
-
Filesize
5KB
MD5e7375030a43a7fe26534b7f19f3f3581
SHA1d4f6cbc80c479a56cd837ad53235b838de195a9d
SHA256bc982b105711096708b57b75ede80be34042983c6d35fb9c3df45e36fc07f8b5
SHA512c1609a477719ad637b1bea69b965446e2571630b2a55ec13b9e0dc0eedcc0dfdd6b6bee24ca5893f4e9959e124c90a6bec41281dcb0f389e5cc191b0972d4edc
-
Filesize
6KB
MD52db748cbf939aee648f668be7e38ebf4
SHA14f25bdb1d8547fcdad41fb0d3a4d680c844a16b6
SHA2569006de61b2c3e8914d758b9686597c4baebd65c34d1e2a2d67ef39e022b7572b
SHA512b2b6fad48f8c9dd3e7633ef3fbf6b0a6017e873f403944e75e6fd08620b734f479fb2e50fba63725bfaffaa6915298b70110f579ba10386c6355976133e6bd5b
-
Filesize
6KB
MD53c7be728a127f1e9fd584a37475347cc
SHA1a11f1252e82dd6daff3836b01d6ec2ed152ca4fb
SHA256fcac077192cf11ad1fe8bc95edd5dfd792ddf55082cdbb95f547a11bda689c06
SHA51203bd63bc4cb968f02e5b83cb1d300aa30ba9dceea2b6680855cd5e6b3b0620ba1bdef0e5cafd42c41c27eb9d54cb65fa466c6319b6ad5e66bd3fec6a64965bda
-
Filesize
110KB
MD54aaeab341654dcaea82093cbef316fc3
SHA1ba4d8b786f4d3b5398c0faa9e1de37c4046fb25e
SHA2566d3c306fe42bb934dc978a13cf8e829597856af4e3ee417a50c6c1873988e324
SHA512d2b9b62e0de6a696d37f178c6b7cb3fbd895984777634ea13f5be1a7d89b0172d42d352d8a4f6e7d432446846abffccba34e98f6b053f0768096fd811f118dc4
-
Filesize
110KB
MD503a19fba78d9ccf34fa9b883f889e6c8
SHA107828d760a34e5d3ea44070f10619c0ee18d8d27
SHA256d29da2823db95fd0c27183e26767069bcf3e587fd518eb2903c241ea8cf18412
SHA5125d0860841203955fc371413a99278981a5a39ac6af7dce36fd8562db53bc88550d6abe7ab3767f9b9fe86bb15371a2716c88b8deb52c9e7c6aee64be5780deaf
-
Filesize
111KB
MD5480acd7391d7842518ca94bf2bc1347b
SHA1244b991b9eeb0d38f4dce303af287cbb5b8f1adb
SHA256ce0720e17aa4cd69c113ebc44459bc80e69bc5887922ce2562dc1813cfbee8a4
SHA5129d028286738657ec4abf8c1a180082879cb5bf631d82a97a086a33064714c03da20c095acf42897cc357f5b34f1688615b930193c054e5d18b38b4deb549c031
-
Filesize
110KB
MD59756bb76ca23bc28accef1930556d618
SHA1b1902ccd20b3cc5db1bc941557f2b980956fc015
SHA25636cd80923b21464e81edc4ccca0599dc22e22a3da7b025ed70129bbb96a01ef3
SHA51270e621e320d6bb69aa173c819ba5a33db2217215da22f66e892f6a3a462579272de4ea405dc7f045be592f1b618cc0fa6db2a1ffdfba81fd316147b2c572a045
-
Filesize
154KB
MD520decd6ae88dfced2fb512be71c49999
SHA1c91886c0d96bfc0eb46ee6c1429684c9afd25d76
SHA2565b5f4adecb61171a729c45b1bcf09a86c988299d9efd6464e6f42e746090c2d8
SHA512994d08933e4aeeebca1b397fa21c1c560ec35538725f9e54f4d790a5d2c98a1cb8f6289be7e644d134a802818e5b0ee5168971caf59dc494deb22c037c10e448
-
Filesize
128KB
MD5f51c8c36b460a2aae800d86652e3976e
SHA163d5a560c66e70e767108882202f569d88af5fd0
SHA25618eb65d691331a4029f55e6e9ecc537d05720b70a84b26f27d1c960790cf282b
SHA512bffb1d50ab4809d09c54c7307f10bf29afe5eb8b7a8bd6dcfc968ee518c7c3b7bb468f3e499c655303907f737b646605cf6e6f350112a3a66036f2093db2bcc1
-
Filesize
111KB
MD50582e703e0eaf2f02a54dc11155a1646
SHA13ca922be6857d7b3f39705dc0fba2100bddda807
SHA256480c73a6614c16d55a685356da8112f1c76da7b647dc33ae3aae01aca20a4cea
SHA512b495687cb1421d14bb6870843651ae4899cb8ad372c49e0644c32fe58d419722ee2ff22f8334ac11f1252a3d647b6455d183a28da32e9fe96b14d0c5463219ed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
4.4MB
MD5c25a6601a2dc5699499a2f4fa447f0dd
SHA1133da24f3de7fed86031266e960a8d14a393789e
SHA256d1168456885d99b19befa3046b2b3ac18cfe0ea1c37670598a5904b0615e64ac
SHA51221a63838ed24c12325f1c6e5f0c871bec148d15d93a0fdf7f2113bed0af3e187d160ed7321690a076e84b793a36e1e5f83f03eeba515d6557a9b6eacc6a98a10