Resubmissions
16-12-2023 16:06
231216-tkkzbaddg7 116-12-2023 15:35
231216-s1hcpadcg7 1016-12-2023 15:29
231216-sw8dbabhgp 1016-12-2023 15:29
231216-swvr8adcf9 116-12-2023 15:23
231216-ssm8zabhgk 616-12-2023 15:20
231216-sq44psdcd8 1Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-12-2023 15:23
Static task
static1
Behavioral task
behavioral1
Sample
D3STR0YCOMPUT3RS.bat
Resource
win11-20231215-en
General
-
Target
D3STR0YCOMPUT3RS.bat
-
Size
26KB
-
MD5
18aa3a29ea6572754fbf785a2eb03ed6
-
SHA1
69ee89c62e3fce0ae58e5803e283b511b41e8d81
-
SHA256
31890493973af1dbe3ecd33a59536cc24fa753ccb603372e17a05eafa5378746
-
SHA512
f2d1cf6512807e7868a48ea0c94eda7c6e75c8f5bad03e2a3313c39c83230b5116a78c803979ad051539c4dbcbf9aaf5c430f3d2259eca714d63e626ab4414a9
-
SSDEEP
384:89OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9OhQ9Oh:3
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133472138486842901" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-175642277-3213633112-3688900201-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 5336 chrome.exe 5336 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 6136 Client.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe 6136 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3984 1592 chrome.exe 88 PID 1592 wrote to memory of 3984 1592 chrome.exe 88 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 568 1592 chrome.exe 90 PID 1592 wrote to memory of 1224 1592 chrome.exe 91 PID 1592 wrote to memory of 1224 1592 chrome.exe 91 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94 PID 1592 wrote to memory of 2696 1592 chrome.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\D3STR0YCOMPUT3RS.bat"1⤵PID:3656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xa8,0x10c,0x7ffd5c0e9758,0x7ffd5c0e9768,0x7ffd5c0e97782⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:22⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:5212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4672 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4524 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4980 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5108 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4620 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4836 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3372 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4924 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5508 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3364 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5692 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5744 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5360 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4476 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=3248 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=956 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=4624 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5908 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=3440 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1940 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5460 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5344 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6124 --field-trial-handle=1784,i,6045923737042544815,6851366502728246245,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4556
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Poison-Ivy-Reload-master.zip\Poison-Ivy-Reload-master\Client\Win32\Release\Client.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Poison-Ivy-Reload-master.zip\Poison-Ivy-Reload-master\Client\Win32\Release\Client.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b5f4f174ac2b230ff25d736147e578c2
SHA11a9d7f20803d1b0c7c6ab851db89c0129a1d365a
SHA2566d1dcae98758411bd694741aeb164c54e89493a31dbd21c6100b9053233720b6
SHA51275f23655c82be5ccb7d1853c592d596fcb77886006e52d978997d71383b99571f4521d13d6b5f29d695e2560cdc88bddd151fa08563a90ed2f3b42bf846b686a
-
Filesize
2KB
MD57036c88868d12c71894cf684dfb16d92
SHA145712671ad893dda048ea294968033dc0f201d62
SHA2567babf75f62cdbc9f556e70559f20054f81f3a6cf5ae8c805489b5ec13f84706c
SHA512debf69e2465224de29c36f81a603198dc20de1d2a76bfeeb5e007f3f8d2372307088dc4993ac4f96112512c27a7a01bae9b5787242290e0cf914f86097350b1b
-
Filesize
3KB
MD5e922e634ccad8d7aa47c2b20b0ff1aac
SHA1fd684e2399a9182f950d4a4f370f5e122161bcc6
SHA2563cae5c62eb6bdd635be07bb129efd2a36f432a6414a8d70aa5e90a7448accd0b
SHA512a578b2af6682cc60b4278209c62c3206d2d1a2cf6bbac349c8e41d8bd4fa439d5967762b22b5cca768b86cfda83a85e676d019b76f1912361f55a0bfc8a909ef
-
Filesize
4KB
MD52f12ee7a709e0f0746f811d8492af38c
SHA1564dc7f0581942580e08a5f82c3b43e04f749be7
SHA256e0c44612a048119c2503f4565abb97924c69d5b129afa4a0d3bdcc480f5d992c
SHA512737022c91d3198184ad2ac4f970e95e8edc1632dc06669af4cb023b5c26f99e72d933a5a8b5541bb14aeb236c077d7fa87e225983e2b220c4ea7b7cbd572c928
-
Filesize
704B
MD5b9a944b983ea916158140b1b9b49afba
SHA125f77a0fbf3cbd97ffcbe44c6876bcc342277de4
SHA25610310cf9304236c3b1239fcfced6517fa5dfdda2ae1537524f26ca0ec5dfe857
SHA5120309dda6d71ab57f7c5b66c5e2271853ff5399c32160c2a3708b2973e8aa7b5a9be0d89be179ecdf23e5317606a8ca10f634313a6c3079b4ac9d96702052b8bc
-
Filesize
1KB
MD524d03ade6baab88757a63f06c8c3338e
SHA13643c8b1b7e2abddbe80275e668e30109eb99109
SHA256105b61962029b2804f3d61cbbdfdb0edb83b5ebca3c4471311a44058e1d57f5d
SHA512529220ef8dccab9923e4af3120c700c4daf83ba47f722291d02cf50829cd3bdcb7b45e4fdf6d52f2433deaf7187e667ed0b132d2a96bb2e4267cf711fae73ee7
-
Filesize
1KB
MD5bc54f2fce10c0206ddb3a8578612008d
SHA1caca93c38f2556bd8c31d1c1d14b725d7f5dd537
SHA256e7c700c4aa3ed478c76b31d713f39aee0565b5e652a8614c20b3dea9bebedf76
SHA512e3c7b655a44f7fb755c1192b2f24710fe52d4f6bc874b5977293ce6d893c992c2e0f7b917c072dc81b052010e2b861bd54199a553b3435df580317a136e6d114
-
Filesize
2KB
MD5615085669360bbd25e6a1e742905baed
SHA1f73e3dfb8799cdb4e7d8240bde314046566d77b6
SHA256d53f4d7a70d8b63dbe3a8bb5a178ce973cc41e8c33274c4d73f33c16b356d6f3
SHA5120d8ccc2fac629504980c13240c8d7fb943a3ce0c015ce435f105c3cbf9a108f7803377b59d64a18a21ee88dc0c61b9e46351387e369bff5f82a0e2c625e31464
-
Filesize
2KB
MD5cb90d6e6bafd96b4a9f1a4908f7600f1
SHA11a33f49209509b3c2339706ad21f6e4eae869f2a
SHA2569ba2c770936e613301b9a6202a632f419f2dd647b44a4a521afb0c15b0033935
SHA512298e98731b94d2f03b91cf712560c60d5fb1c5d05feae4bdb98d04a7148543f835bcc2721fd26a96bb54c8db16330d272b276d4f18eb99271b614ab910a918d4
-
Filesize
2KB
MD5eff64d3285fd28c27b3e68df4db688e3
SHA1f0789fff368854d4964eae8da6f8b6ed0a339b23
SHA256ca2f78e25ca3142b204094c3893fdbadcb05e370c995e796dc4ae2c086cc2890
SHA5123f163653c4fdd9988b8421b088c39f51ca6f045342f601a9a94f8e4e20d731d0a480dfd9cd26e640d77ef9c980ccae5a4515e38b057d67b1ba27d9c6628b247f
-
Filesize
2KB
MD5bfb313cf7923cf371e94d3149726c4c7
SHA1637e0842a86f96792b696013949b47382cf913fe
SHA256867777bf5612fe6346b2b4898302db60e8de651d790a22081402d2248218e388
SHA512a1991293c9c653c0cfc63a127bb455f715b8b46504632465a7110db26800dbe6cd81fcb09b19df74f9291dcec0e9e5b1d6f27ed4dfa77535296d571e06431b88
-
Filesize
2KB
MD5b96830d6852d9884f6708ecc64699b16
SHA1900d667762a44c818bdfbdef9544bd750ea36a80
SHA25665faac82b87847f8f5e670a584b74e1221db8a0fb06fa259364dc3caad8ebde1
SHA51245450d744c78a7e9ed45de6a31478a680a215c1255ba950ec234235721429a2b074d039a8cbcd85623b57591215afa33d79c78cbc34b16015b4f74ed1a7f46e9
-
Filesize
2KB
MD58dc033ec295e1adf0fe50ff8c9b1f921
SHA104334a7e6ab433baa8ee9a53124978885f5ee6f2
SHA2566e302abeb4e43ddcde73ccb91abe6e2b297c04f7bc5d780e77e0f19b8e92db98
SHA512a8c20e2377926722e000a7cc60b27dd9102eb8a25229b2b51ec436cd70b0f47d05aa52133df31da10b2dd4dba53349f3c2056ec9d305466f3c4a5999b4beb253
-
Filesize
2KB
MD5294b378825adfa62aa6e2326fede1de4
SHA1ca225b3f18f88502cb6d20c6c8db4dd07f09f80a
SHA256252e91b41a6d2e51779939244b9e34d956ea9655251244cde99f4670daf291f0
SHA51213ed0ec527fe71d400a5586c0acee8162c0f96efa44eccdf69bb34e32d7e3481cd056d8f5c5c3a7cc973a69ce5b1f313ee104992a8fcf730d56c93e06ddc3c47
-
Filesize
2KB
MD5e01617f3c4a0854f1496fd92879e6a52
SHA1037aa232be96ab9ad6ede349caf4d9bdee3d1ff4
SHA256681f4455345acacf0b6c2029a532d6372fee573daf66eccd13214bec578db203
SHA512c51bf1cc9b65dc0ebb727e9798779ddc06f34e8b68fab3dc969933ff13aa72b3f03c26f23a97e1ba9bd6948ea997ae51ddf6a2444105596e7279990a9e5742fd
-
Filesize
2KB
MD5c84f75edd1ed774f4181ce45499425d9
SHA1f39ad093ef0991ae06041f75bca9c8b10ff79b3b
SHA256101b94b1359ba9beaf9e0246568023520e19c54154d926c46036cdedf88c8847
SHA51297696502e961e73484207d3397e0c16b7a5a076752d6b3b77899deddcbe1a60ba3dba663d697b6dde8f3bb62bb4a63705d98f88858cd02add2d40e02cd8f6391
-
Filesize
6KB
MD5095015e6b50b30c92b90caf775aa6a46
SHA18fd3879a7364dc7851d4571016981329d29f59bc
SHA2560c70af9e090121afe2c29f7b782486d53def8d561d5e0dd73ad93c6334274cf8
SHA5122ff13a989ffd4659d8d9b2008341737a8b76b888e357d4497872fdf1c3cfa77f93b81df8a6d921d7feff46a25a2cd19319c8d2bc3ada82f4917115849eee0b61
-
Filesize
7KB
MD52786a1a4a5f9a708d2f6975a1e46305c
SHA103345d46e34ea044cea0b3c53970622fec46f9a7
SHA256ebf432f4af148ba9efefafe10e3c3c8b2b55c02c4004dad5ef311b4e7513ac77
SHA512306227e585e6065a7b273be3c4d694b7fd31d5613602182a30e26d790b150998b7389211f6af581b2d1be9f64637b7f20ac8716ca425d5f9330d48d8c8ff53d2
-
Filesize
7KB
MD5733fa593393400e5704be127602b1dd2
SHA1805388e705729ea4a7902e9cea59d51ac5968452
SHA256fe757803eff383428f9adb4714ffc2c1a4350b862143f4a4d6652cffc9d610bc
SHA51234aa4e60d14f4037fdf476fe23b1194f92c4bebb7960dc655d932857322f6829655d3528fba4933915c045096b1eebd618a699af6aaf0166d512f95e227ff352
-
Filesize
7KB
MD59f28c0c77b72a2ca0be1a5705d939e30
SHA149e8d0259eafb843489fbc7b2eb22e138f6ed073
SHA2560ebaa9bfbf713821b9f0de34dc2d5ac2d2e54882e430934012ec03464af22762
SHA51202280462df48b0c9a008f7f4b2c12b3d7f606679a35af9bbcddb17e3a2f74b5548e7840f5f45cebcd5edb54feae468e611a374eb41eeab8fb2ca93990dd5c23c
-
Filesize
7KB
MD53046e7bd1a6f92732fc0857e9f576165
SHA1426d0a888c801cbdbac33e3332f579a644ff80bd
SHA256bfb252976aa7f99ac19d1eb72064485b6d704e6e9ab4206cbba4e1531bd9e09f
SHA51266e1dbf7ab18c33cd904075186393d5ca15ac6dacef066da7fde11b87228e8b0423097e8e05dd01883b546f00b422fab33d96aab81e6de534e33546883550419
-
Filesize
15KB
MD534f3027ca047947b70a0d209f24437ba
SHA1f3f3e994932bfc7e66852c9afe1963ca9277a046
SHA256f046e455d5226959bc82d50c763db538158a66f89ba7cfe0ead854f2b12e5805
SHA5126023c6ddcfb065fe368c87470e4c2e2293c2ae01f581b1ea80213dd167d6c89cac4428b61860f3403e7c6f7452e78a0f6557b494733133d3790b82fb6bf523cf
-
Filesize
224KB
MD5dd4e8a5335948bb94f95ea0a434e8808
SHA1b31771e827e06369e9640e99a95792b82d87725a
SHA256f6e8042a41ec94c2b5549e68dee93cbc34ddd4802bfc49f6410601d8156125d9
SHA512abc2bdbe2d2fa0f61ba5c6eeabc0f39a948099bf5cf589f1642efeec006bb2b7daaebcd55c5f187e7cbf9b1e0f1b59a9ee1970fcda34efa471cdc208dec282b0
-
Filesize
224KB
MD5e1f448f0d5cfe94e5ada2d84fb167381
SHA194908fe3de8bb9a5c3613a3a044c5af496206cdc
SHA256e124fc1e4c07904da0bb5b1cdb0a6c16015e8bb96668ace5a61696a2a047d974
SHA512f3134cf8955d5c9f67ccf075775a20f09656b01bf3edae87714c8a2d65bca84e7aadc148e5dad79a91143f7d6332b9b58e4e64a93256fee1e67405c8e4d30aaa
-
Filesize
224KB
MD53657f6a8c17de1e414e85768bb3cc1a8
SHA1b7538eead5aed7a874c196ccbbabd1568816b6e6
SHA256e456b68de82b7ff95df540c3ae0f584801997c24980f1e1070de6e61f7674cd1
SHA512db84a6ed2158322b812f58f5a71a01d735998c722db806c0a7166d613c5001b49210ca96b222f62009cb70560f7586944558e10dae4008b5b0e848d019ba3c90
-
Filesize
94KB
MD5703d9defa32261c50fc8ecb8d9710cd9
SHA1975ecc4fe51587bcad081231c096e1c6b5ab24b9
SHA256cfd6da16fe632398f96b9c626b4ce7db5f2123a68a56aa58accc30f2d603b551
SHA512dd06e3a41e8dc97a975c31252279f3a9ffc7ecd7eee86e8e3f5f7e0aa093be4e1dc7c158b8441129b51b852ef6c945b8f78c4ebd8cefc59da33f7236348fdbcc
-
Filesize
101KB
MD5722d845e6ed0ae6316aba314f4b3ab43
SHA1e55ff4447ca7df87966ae18cb3bc580196f0cf80
SHA2562c8e237f03d3845c2bbbc0595aa512c0618af197674f853ded3044b1f6bae1b8
SHA512ee0d76beb06fce06cf76886b6087d26c812d07a48ad3fb8f88371464705ac0ed7d6b9585439cb7cd18789a70c35d3880fbaa8418d10754a8609effb1a9717cf0
-
Filesize
89KB
MD5be6fac1d039daa856b1abe9c27274496
SHA18890e660f666d82f3b0b89bc46848d6f863e7bcc
SHA25688597eaeab44f8012c4d63733dd2fa328edf40d1cb091d301d51b29849d72d62
SHA51221dbe26f78d6db0601b1e9f2237df82cb4d56db24f410fae78eaa3fe23a951776cf94605d8a2c4ca06d0553921217667074377518500383ae684cd90b95c4050
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
24.3MB
MD50a82459b752250fab081cc37150b4218
SHA120cdf52d2663f2984f990c65afb3f0c03792ad61
SHA25683cee6fe3dd5f5b1e97fb9492d70840958cdfd73b60c460b3014a2cbf79701d9
SHA5124e8340e15fad10913a269f015a0f417b0294b7d58ed57707fe0fea0082546d3a82196de6f00d14ad8ee7b6ddd5c72cc66b0f08fe7ba13bcdc2e85bb5b91fb8cf
-
Filesize
2.2MB
MD536340e862a77197987bb243f40cf39c1
SHA1012c75430a508d51c24ba9bc111789c785c8a474
SHA256ca3f6a9966879b0e3ba3f17505677c5c4c244bace7bec837e0b8c576a715f888
SHA512cdcefc7b18dea0ca722a87cfc5245484968707a60790073e8d5fc011ea1a30c135479b41381318457cd4098277d933223a24cf041f56b4d2c8e0b4f2966eb621