Analysis
-
max time kernel
168s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 13:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://link.mail.n.arkansasonline.com/wf/open?upn=tOLw1HCnqn4eVQ7uA64xmCmuchthFHkb4MR5h9rfgQpyDMnD6Rh10VNURfT-2FkUBTBo5freiDfBkYYG1YERjiCSrhxEqFlQjoLXs1NrSnmRA0NL9LxU3f5Xb4zIC1GIKs4nVqk2N-2BZpEREDwL0kAITKP1BC-2F6jOK8J96hTlzn0MQrj-2BPoum1ttBd4KKRMK9wjeKCtVA-2BbJSWathw7jhYP4jzCQTgRGPTOf-2B0kLZPtGLOdWyV797niXKwbovlqj647SjzLaDVyUSUilCfNfOgSDT9qnuiVHu-2FtLeKcyEbVqLsVUYi3Cvrx-2BIqj7MQ54P5nSoAJ8u9eJ9cnMRIZ1ugjpl2-2BdMTQwy2vBWltPfLit28Kprmy0dnTin7fmIs-2Fm5phkJHMpIrfMjbKIGr4e6WGNVLo-2B1fbaOtTYfIcbVZSaMczj34wytMyOv1uwWCosCaktTbCfAw-2BVjdcXKiOkgbkkJZg8QPaUaKleZlHeFRwwXvI4B-2F7ZrDNpuPkws3kuplmX8lbHaphT6xeTdu-2FYKSyeAIBjxyGcGp4oNePrFEVfHUEzRSysIXDA4AN-2BraGePkwZcDC52Vm7pYE5Su2HlTyG-2FJPIYQO-2BZ0AVXWiGzP5dFhUKhwEaqdIcdvX801nG9d5xauatKLxwKrElOkf2-2BimbNwAoYr36cap-2BUjK-2FeUmsPPAaM9ITCxDWGXW-2By39KCE-2BEx-2BIl-2BAAhBJkAVSSnDqZbcT6dQlmcf1a3ffEivzLWPo-3D
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://link.mail.n.arkansasonline.com/wf/open?upn=tOLw1HCnqn4eVQ7uA64xmCmuchthFHkb4MR5h9rfgQpyDMnD6Rh10VNURfT-2FkUBTBo5freiDfBkYYG1YERjiCSrhxEqFlQjoLXs1NrSnmRA0NL9LxU3f5Xb4zIC1GIKs4nVqk2N-2BZpEREDwL0kAITKP1BC-2F6jOK8J96hTlzn0MQrj-2BPoum1ttBd4KKRMK9wjeKCtVA-2BbJSWathw7jhYP4jzCQTgRGPTOf-2B0kLZPtGLOdWyV797niXKwbovlqj647SjzLaDVyUSUilCfNfOgSDT9qnuiVHu-2FtLeKcyEbVqLsVUYi3Cvrx-2BIqj7MQ54P5nSoAJ8u9eJ9cnMRIZ1ugjpl2-2BdMTQwy2vBWltPfLit28Kprmy0dnTin7fmIs-2Fm5phkJHMpIrfMjbKIGr4e6WGNVLo-2B1fbaOtTYfIcbVZSaMczj34wytMyOv1uwWCosCaktTbCfAw-2BVjdcXKiOkgbkkJZg8QPaUaKleZlHeFRwwXvI4B-2F7ZrDNpuPkws3kuplmX8lbHaphT6xeTdu-2FYKSyeAIBjxyGcGp4oNePrFEVfHUEzRSysIXDA4AN-2BraGePkwZcDC52Vm7pYE5Su2HlTyG-2FJPIYQO-2BZ0AVXWiGzP5dFhUKhwEaqdIcdvX801nG9d5xauatKLxwKrElOkf2-2BimbNwAoYr36cap-2BUjK-2FeUmsPPAaM9ITCxDWGXW-2By39KCE-2BEx-2BIl-2BAAhBJkAVSSnDqZbcT6dQlmcf1a3ffEivzLWPo-3D
Resource
win10v2004-20231215-en
General
-
Target
https://link.mail.n.arkansasonline.com/wf/open?upn=tOLw1HCnqn4eVQ7uA64xmCmuchthFHkb4MR5h9rfgQpyDMnD6Rh10VNURfT-2FkUBTBo5freiDfBkYYG1YERjiCSrhxEqFlQjoLXs1NrSnmRA0NL9LxU3f5Xb4zIC1GIKs4nVqk2N-2BZpEREDwL0kAITKP1BC-2F6jOK8J96hTlzn0MQrj-2BPoum1ttBd4KKRMK9wjeKCtVA-2BbJSWathw7jhYP4jzCQTgRGPTOf-2B0kLZPtGLOdWyV797niXKwbovlqj647SjzLaDVyUSUilCfNfOgSDT9qnuiVHu-2FtLeKcyEbVqLsVUYi3Cvrx-2BIqj7MQ54P5nSoAJ8u9eJ9cnMRIZ1ugjpl2-2BdMTQwy2vBWltPfLit28Kprmy0dnTin7fmIs-2Fm5phkJHMpIrfMjbKIGr4e6WGNVLo-2B1fbaOtTYfIcbVZSaMczj34wytMyOv1uwWCosCaktTbCfAw-2BVjdcXKiOkgbkkJZg8QPaUaKleZlHeFRwwXvI4B-2F7ZrDNpuPkws3kuplmX8lbHaphT6xeTdu-2FYKSyeAIBjxyGcGp4oNePrFEVfHUEzRSysIXDA4AN-2BraGePkwZcDC52Vm7pYE5Su2HlTyG-2FJPIYQO-2BZ0AVXWiGzP5dFhUKhwEaqdIcdvX801nG9d5xauatKLxwKrElOkf2-2BimbNwAoYr36cap-2BUjK-2FeUmsPPAaM9ITCxDWGXW-2By39KCE-2BEx-2BIl-2BAAhBJkAVSSnDqZbcT6dQlmcf1a3ffEivzLWPo-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133487617055192933" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 5088 chrome.exe 5088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 1176 3988 chrome.exe 90 PID 3988 wrote to memory of 1176 3988 chrome.exe 90 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 3596 3988 chrome.exe 92 PID 3988 wrote to memory of 624 3988 chrome.exe 93 PID 3988 wrote to memory of 624 3988 chrome.exe 93 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94 PID 3988 wrote to memory of 4824 3988 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://link.mail.n.arkansasonline.com/wf/open?upn=tOLw1HCnqn4eVQ7uA64xmCmuchthFHkb4MR5h9rfgQpyDMnD6Rh10VNURfT-2FkUBTBo5freiDfBkYYG1YERjiCSrhxEqFlQjoLXs1NrSnmRA0NL9LxU3f5Xb4zIC1GIKs4nVqk2N-2BZpEREDwL0kAITKP1BC-2F6jOK8J96hTlzn0MQrj-2BPoum1ttBd4KKRMK9wjeKCtVA-2BbJSWathw7jhYP4jzCQTgRGPTOf-2B0kLZPtGLOdWyV797niXKwbovlqj647SjzLaDVyUSUilCfNfOgSDT9qnuiVHu-2FtLeKcyEbVqLsVUYi3Cvrx-2BIqj7MQ54P5nSoAJ8u9eJ9cnMRIZ1ugjpl2-2BdMTQwy2vBWltPfLit28Kprmy0dnTin7fmIs-2Fm5phkJHMpIrfMjbKIGr4e6WGNVLo-2B1fbaOtTYfIcbVZSaMczj34wytMyOv1uwWCosCaktTbCfAw-2BVjdcXKiOkgbkkJZg8QPaUaKleZlHeFRwwXvI4B-2F7ZrDNpuPkws3kuplmX8lbHaphT6xeTdu-2FYKSyeAIBjxyGcGp4oNePrFEVfHUEzRSysIXDA4AN-2BraGePkwZcDC52Vm7pYE5Su2HlTyG-2FJPIYQO-2BZ0AVXWiGzP5dFhUKhwEaqdIcdvX801nG9d5xauatKLxwKrElOkf2-2BimbNwAoYr36cap-2BUjK-2FeUmsPPAaM9ITCxDWGXW-2By39KCE-2BEx-2BIl-2BAAhBJkAVSSnDqZbcT6dQlmcf1a3ffEivzLWPo-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff9987e9758,0x7ff9987e9768,0x7ff9987e97782⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:22⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4592 --field-trial-handle=1844,i,579432851629850859,7099739260161506040,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5f134fda98a277b1c8f20ab8fbe2fbd58
SHA1a922796190a1f5bbb3c410c6ec591502050df04e
SHA25627bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7
SHA5122b2e8338afb9b0ca9b5fa3d452dfd80368b5d17566120ae6351b6d03572e5a69cedb97f165fbc31ffb3addcc00506a3fc0761cf2404a5d9826a8448a7c4d9f17
-
Filesize
72B
MD52cfe693c94d63d2c5cc90a57e81ae214
SHA183b24cadb0bf494d775ca7cb0b509276c43ecd27
SHA256dede9aacb577d603597b3ae123196cff6c0e26448ee41319913ac1416ad2475d
SHA512a985ca4fcc7dbc18cf4dc0f67d28278b731c86edfefcb766151cc1b82722a974843c41b04e20991bd56517ba89c41941cb8366e5b24ecfbdceec99304015a628
-
Filesize
2KB
MD502e5432f4774e71fc074b182b780eaef
SHA1f53598bf5d0177d2989d8918e84540c5e77fa05f
SHA256b027c6a8aa05f4f40010b44b142e3ae7594dde4b56021183e75f529b469213f1
SHA512b7a79b3cdf67383e9c00010c29b5e34a890a5b2b2ba3712db114c21cfc9130c9efb64a7064767b40a8d7f0277291990dab60129b992951d1c796dab675e678ad
-
Filesize
534B
MD546b2e8bba8a52656eb642d0ceb65a747
SHA1fa2bb7c425c41a48d51eb3d06772c9c64cbbc24d
SHA256daebaeae1ebd6dc110d594402bbb59aef4d5fbcb1433e2c06e7610a8e6db42b6
SHA512345e5541196fe7ba490a96f34303c2be1a0f4a9347776fce26011249213019c04a7c36341ff9b2df15510d9359625ba6c909b7c55948e27f426e8e499a8747e0
-
Filesize
868B
MD5efe2d2d496b8a53f151e7ea69cebe438
SHA14380e27e0845733bd257b4ce289f4e9c57aa8b65
SHA256bf8d386a266f0341bc47c7c00b566d655f8bb1b515815a89342d4895301987e9
SHA51208a5113b4fc34a975aaaee137fb814a3f29f9000b9155642fbd3a5a92dbdc0239bd6fc5f85d8579c392b49f0694d6ba22bdcae1ab185e1dad56310264cff50cb
-
Filesize
5KB
MD50fa7854faac9eaf0ed2b1121719ceaea
SHA1389f2069d9f56563b89554c30953cc3a702154fb
SHA25634f40117d6b9a9dae47209bd446ac8c142eda9b690ad86caf9d890c87c7dea69
SHA512bc4484b66493d2eb3380dbc9ad404eab8e7886806edb2d9adc56cbc5b25a762cfd2011e980ce7cb39f7319bba4e8569f9469bf524724c532846ea129d12c7f0c
-
Filesize
5KB
MD52c5513cfdf28bcede735043477b0a823
SHA1a2fc5bbbe79f8e4c15ee847de242d55a0d629a53
SHA256dbd89966c956960763db930753d17e52ff0399c8648d4de38767b1f25949af51
SHA512cf90d1e3cf3d19ac0d91a1dbf15159df26ce08dce5bb6fee84dae984b01c156fdad107cb1a1a80c284303fef7b707cf25618c48dd15ae70e01caa71774632753
-
Filesize
6KB
MD520b15348c3f27a884589af00433da90a
SHA19156fc433738311ba50640cb47bd5c27827db307
SHA25673f775fd9bee17d88ca87a5520e9d3b0c62bbb131c582eb326f9408bfe11249d
SHA5122370f2c3e912f9d738b591872b11f7b55e474ed6c40f9ce9797a98c71004134f4fa8d73d4ace6b8fc10ad5fe3ec92ffac6b72a286ec93be7b379058a88a15280
-
Filesize
114KB
MD520e9e7d05a8883acfd251b71253d74e3
SHA1a4a417513dbe2145ee558aca9584066990276570
SHA2560404bfeff66394713415e25f254cb517273028f5e890bf6383b381e5f96d5802
SHA512d023b2680556d5540ba555b1aa8864bbcaa641428ae16308066aceabaf8bb66f24022aec022954162323159477f8c768fdd4b1b8087107b17b3f62c9a3cc34c8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd