Resubmissions
15-01-2024 13:16
240115-qhxnjsgdgk 102-01-2024 07:45
240102-jlpzjsgdg8 801-01-2024 19:34
240101-x93gfagcaj 101-01-2024 19:21
240101-x2y42saff3 601-01-2024 12:16
240101-pfkqjaafan 631-12-2023 10:47
231231-mvqh8ahdb5 129-12-2023 09:34
231229-lj6wdsgch5 628-12-2023 06:08
231228-gv5p9adaeq 128-12-2023 05:48
231228-ghrmvsahal 728-12-2023 05:47
231228-ghbawaagel 1Analysis
-
max time kernel
371s -
max time network
369s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 10:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win7-20231215-en
General
-
Target
https://github.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX chess.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989}\LastPlayed = "2" chess.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989}\LastPlayed = "4" chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989} chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989} chess.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989}\LastPlayed = "4" chess.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats chess.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989}\LastPlayed = "2" chess.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{E2856B15-A196-4C82-BDA1-C75D273DF989}\LastPlayed = "1" chess.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2484 chess.exe 2172 chess.exe 1988 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe Token: SeShutdownPrivilege 816 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 816 chrome.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe 1988 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2484 chess.exe 3020 chess.exe 2172 chess.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 816 wrote to memory of 2148 816 chrome.exe 28 PID 816 wrote to memory of 2148 816 chrome.exe 28 PID 816 wrote to memory of 2148 816 chrome.exe 28 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2716 816 chrome.exe 32 PID 816 wrote to memory of 2720 816 chrome.exe 31 PID 816 wrote to memory of 2720 816 chrome.exe 31 PID 816 wrote to memory of 2720 816 chrome.exe 31 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30 PID 816 wrote to memory of 2724 816 chrome.exe 30
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6619758,0x7fef6619768,0x7fef66197782⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:22⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2192 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:12⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2184 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1468 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:22⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=656 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3368 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3624 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1500 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3844 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3836 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3980 --field-trial-handle=1232,i,7336653386014922104,12621143523217583341,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1716
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2328
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" SYSTEM1⤵PID:2536
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1972
-
C:\Windows\System32\slui.exe"C:\Windows\System32\slui.exe"1⤵PID:3028
-
C:\Program Files\Microsoft Games\chess\chess.exe"C:\Program Files\Microsoft Games\chess\chess.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2484
-
C:\Program Files\Microsoft Games\chess\chess.exe"C:\Program Files\Microsoft Games\chess\chess.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:3020
-
C:\Program Files\Microsoft Games\chess\chess.exe"C:\Program Files\Microsoft Games\chess\chess.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2172
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5ca3ce0f77be3cdce65499a34e3ee4d61
SHA1a1b3648088ba3a2d66b397cf71c41a13b254b808
SHA256b71bdb33230885d8271621fd3d48d7cf537b537c97974d6f7e815e268825fdf3
SHA51217de2646ae3d3427ad9159e8c0bf5b93d7f3c34bdc57865704d6bbcc64811f363048f36476d3888b531f91ca564eef8c163a1a620ff879b4c2dddca6af8d7c5b
-
Filesize
1KB
MD51b7cd23f6980c4b6db8ff2210eb0a021
SHA1aa2d4ff86123b234ca86dad0b11ad70d45597e7b
SHA256972dde681af2ae787ac9e24024bddc2b14e16e42ef881fb4a7658ce39627fb37
SHA512674d788bea20031a66d79a0f32dc13e29eeaad17d0d3021e3c88e6796effb19d3e65ce88ecc5badefd133baa90f1bd18d750de20522321bb660ee5d98d77599a
-
Filesize
1KB
MD5e20a10957d0e14933aa0bcc890adf2c1
SHA1d536a4e71479193477f3c5377845db247b54bbbb
SHA256d0bf5840960024235e94940365da91ef0dbe7de1b32c02a480c17136e10bfce5
SHA51214385c4def431f4095c9468da118ab2b982340e91062baaa4ca5da3d5793a4b6848dcaf50a8a8377ca0e03901147c8fdfe4dcf7d0ac51093afd36512cdc2ce99
-
Filesize
526B
MD58960e1841a661a6eb91886b5c446f501
SHA16eb4b8a8a4dde0a734c33764f6923b36ad2f59a6
SHA2561621000a4c80a7de8f6ff5338118036a81e2ed7b55b16c31ba68611083137d21
SHA512646c596f0702e5fb147fb007e89acc04e93a62af8de965f3def515c15d8e3534764c98900a25496fa50a943ec05f5aacf004f324c97d70349e4efbf07d7af5e4
-
Filesize
526B
MD54313f39bf5c3a0f4393bfb2dbbfc1d55
SHA10fc80e5a03e71137d808d4ffb79f69fb1ab78581
SHA2561ec216217c3b4c83fe579d9b0fab3662f5e6ad3bdd1d7a8e6f213d40d40ffb0f
SHA5122fabb524c059aba9f9d04d9a20f15cc77519d4a5e38816387f5fba74e221499cf5ea3f969c2d517f4d2dd51d0ce3f4970c6a89fc389b05fefc880ef6dda732b8
-
Filesize
4KB
MD5fe44ea57d32be78015ba85c1b5d7948f
SHA17c7b71e397247bfee5384b35ed5b13cce36b2f19
SHA256421a2c07fd2569d4b17d07569f57e60481c778dbe3d956741f71c47020c9b4d5
SHA512eac17418dad64da85e958eb76b4b21aa1d3d3f1abf626b211144b05331053d5869043031506ea2f00d307a02f933f1662ccb6e6e0cd2241cd1641172fdeb5c62
-
Filesize
5KB
MD59c4459361314648864872913ca028765
SHA168d34aa0149a558888ed7cc932327bfe86b16104
SHA256f41bbd15d0497e6e1ae556b844acabd5c8c3b91459550204b7db5bdef8226363
SHA5127b5b69c47ff6136549b49243d5839c20c58e579717430b2536463757941b133a69475cc2858d67455cea1c4a2033b00b6d96ec50c0f10afdb488d35f44605f9d
-
Filesize
5KB
MD53c0996f9f5d53b4f9a679813c5afa470
SHA12c621fec0dc0dfc51978849e643c654885b76342
SHA256a0ccbcce4bf7855df2ca0a5cf78a080faca36fe12033a7d74010c218040db338
SHA51234297720937a890747305f123d2b15c72d25b4b3ffe150d448627fc3b6aaa71a322432ab33c2b5619816b32fb673bd2481226cc4fc8e256baaa7d2ade5f95d98
-
Filesize
4KB
MD54df456d159a21a15c43ebcf356fc6f63
SHA1896e8e9d8da4caf0bbed36f3d57c6f0e5f080c6b
SHA256d4c36e0644da6b66c321c45caf5b122d0a7c7576b3e6d62a1103b8cf41581595
SHA5123cce603db87462e9d344ade69258f9d79f04e62d5d1b7987b65da1f8a60b2db03dcd9e1b144eccf3980299c8b9c004edbbf2b8c640bbc02583f2aca14bf03ff2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
114KB
MD5f6793b8da2d000e0b3d536982f3ee8e9
SHA1693d25c2bb1f75982a1548dcb0e43c9184f7fdef
SHA25602913b92993ee259e5cb62a4c03ded06689676b5bd34c8f3e42bce1f0d64eb29
SHA5123ea7972d416f30e66f8f3f192844cb7a02d4fd2366713afed5b57be0e9291331956a8fc394e0fb044483696e54c45d2e2abdfc76f5bf5e3d987b0c19c75b535a
-
Filesize
114KB
MD56f2bd8cc994216912ffe5ac655700729
SHA13513b8dfc398812f15a65a0f206d21ef23008ac7
SHA2560e2296e6a8fc77aa7592419eb217bdf7d83711c9fb7668e06e5ff454e184f6a8
SHA512d7e1be5540e3edf77a33bb6ca1209c22a5a369eff4444358af2f74503e18805fe68840d62cb31c6b8126c6db7e6db6ae19f4d3a6b7700fd3c7416a9e1387cafe
-
Filesize
114KB
MD50058e03c5545abd9f68cbd19572d7537
SHA1e214abd677432fca4cb9ba7291d70fe94baf145e
SHA256df57f724836ba930062095bfad7fb0c96d573acee2c936c963ca6e2ad9e8d128
SHA51228a06652ef1dd8045104c92780e332440305c4837f1c75ee5a0372db93bfbe9e056c7454850d40586e11d2c110b3d891e7057e8434136cf1b945bf11a6dcc29a
-
Filesize
4KB
MD585cdeda902f384801b4cb9d531f1008c
SHA1d0acee3046548c3399650f293508bb73d1dae8e0
SHA2569531a3b64544c37114e106849dda5243ce6c4a3551bc1a703cb3e6903135f820
SHA5126b4fcbd337e80c6029d344bbf36cd67a831155fcc528f8677c58760841282d09a8dadc699c7fa3a9d7593473d5a75c3607af6924101fc31de9fb25eee45a3293
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{E2856B15-A196-4C82-BDA1-C75D273DF989}\{E2856B15-A196-4C82-BDA1-C75D273DF989}.gamestats
Filesize12KB
MD5d29c3d48948b47ff0856788c7f1067a9
SHA140d1d7542b0ae7e963cd77f4faa31787d13c3eca
SHA256ab13a464752639064f53148f4b6a5960b36193e655f0cc8ed70cdf87a2b5fbf1
SHA512439fe41b99c9fc9b9e1a28405e646d040426e797f94259e93721b14d3a5fed44f1d524f86bdb649339d9c6ad3251bb077943821d602b55ed1a03e61a63762000
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06