Analysis
-
max time kernel
299s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 22:09
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://link.mail.beehiiv.com/ls/click?upn=Lh4BeTv-2FWrvLMAguC7rbeFp6u2eIpWGYpS4FE0ODmku7vFN2dfjNSwYjhvpWFgfpe9NqxrcOT8-2F57csQd33adg5rfWSCVmN-2BYBwdjsGuE-2B1EeakKGEKmojTNvqNtaRFLwmfAqhWkGVZToy1Olpz7RP2phrEX-2FHvyij6oH7OxSdRZ-2FhIjKKXi-2Fdy8EKlmqWy9Hfug_E6Z5pX3ij4jle0fzcoWEqQox9Qz8cnlxaaFn-2B0MRbhKJwOS-2BsLiyG6oDKxPHSsEOT4MSI0yQrSxAwVFMRQPmuUI4lEdMMyTZPzH8t5iKR7RXT3rhowow35wp-2F1-2Fn9NNSJcp3WcEtv1Sfn29tnLep-2FXI4uZ8z-2FlfAkF3vhaYgI7AW1RtzhuBjlNa5QU31WDvCmZxZ2iPkXbnbQlazqJ2r9rD8DT3ddfOLr-2BlwDk6-2FM7lxwCWdTf8E1cQlRmWJylKcWdstrsahsj0BrmxyfvwSx8DdXgtgZV6Dwm5CU7lNjLuhl5Yff4zcR70tun9ClFS90kC64tCkTCNGRH3MXcosccurWs8XdYoGu-2BW8Cq-2FO83V2GeoBbXGsJIokWRpEHxPxo4dlTXdv1JqVxwU17qQZ-2F3B7IB7Q9HVjKFo1V9mGdq-2BgnqlDAVYgcxObqKdeNWQrQ8XTZs3XTejwW3dHYOW7WQ-3D-3D#c3Zlbi56ZXBpY0BhY2FnbG9iYWwuY29t
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://link.mail.beehiiv.com/ls/click?upn=Lh4BeTv-2FWrvLMAguC7rbeFp6u2eIpWGYpS4FE0ODmku7vFN2dfjNSwYjhvpWFgfpe9NqxrcOT8-2F57csQd33adg5rfWSCVmN-2BYBwdjsGuE-2B1EeakKGEKmojTNvqNtaRFLwmfAqhWkGVZToy1Olpz7RP2phrEX-2FHvyij6oH7OxSdRZ-2FhIjKKXi-2Fdy8EKlmqWy9Hfug_E6Z5pX3ij4jle0fzcoWEqQox9Qz8cnlxaaFn-2B0MRbhKJwOS-2BsLiyG6oDKxPHSsEOT4MSI0yQrSxAwVFMRQPmuUI4lEdMMyTZPzH8t5iKR7RXT3rhowow35wp-2F1-2Fn9NNSJcp3WcEtv1Sfn29tnLep-2FXI4uZ8z-2FlfAkF3vhaYgI7AW1RtzhuBjlNa5QU31WDvCmZxZ2iPkXbnbQlazqJ2r9rD8DT3ddfOLr-2BlwDk6-2FM7lxwCWdTf8E1cQlRmWJylKcWdstrsahsj0BrmxyfvwSx8DdXgtgZV6Dwm5CU7lNjLuhl5Yff4zcR70tun9ClFS90kC64tCkTCNGRH3MXcosccurWs8XdYoGu-2BW8Cq-2FO83V2GeoBbXGsJIokWRpEHxPxo4dlTXdv1JqVxwU17qQZ-2F3B7IB7Q9HVjKFo1V9mGdq-2BgnqlDAVYgcxObqKdeNWQrQ8XTZs3XTejwW3dHYOW7WQ-3D-3D#c3Zlbi56ZXBpY0BhY2FnbG9iYWwuY29t
Resource
win10v2004-20231215-en
General
-
Target
https://link.mail.beehiiv.com/ls/click?upn=Lh4BeTv-2FWrvLMAguC7rbeFp6u2eIpWGYpS4FE0ODmku7vFN2dfjNSwYjhvpWFgfpe9NqxrcOT8-2F57csQd33adg5rfWSCVmN-2BYBwdjsGuE-2B1EeakKGEKmojTNvqNtaRFLwmfAqhWkGVZToy1Olpz7RP2phrEX-2FHvyij6oH7OxSdRZ-2FhIjKKXi-2Fdy8EKlmqWy9Hfug_E6Z5pX3ij4jle0fzcoWEqQox9Qz8cnlxaaFn-2B0MRbhKJwOS-2BsLiyG6oDKxPHSsEOT4MSI0yQrSxAwVFMRQPmuUI4lEdMMyTZPzH8t5iKR7RXT3rhowow35wp-2F1-2Fn9NNSJcp3WcEtv1Sfn29tnLep-2FXI4uZ8z-2FlfAkF3vhaYgI7AW1RtzhuBjlNa5QU31WDvCmZxZ2iPkXbnbQlazqJ2r9rD8DT3ddfOLr-2BlwDk6-2FM7lxwCWdTf8E1cQlRmWJylKcWdstrsahsj0BrmxyfvwSx8DdXgtgZV6Dwm5CU7lNjLuhl5Yff4zcR70tun9ClFS90kC64tCkTCNGRH3MXcosccurWs8XdYoGu-2BW8Cq-2FO83V2GeoBbXGsJIokWRpEHxPxo4dlTXdv1JqVxwU17qQZ-2F3B7IB7Q9HVjKFo1V9mGdq-2BgnqlDAVYgcxObqKdeNWQrQ8XTZs3XTejwW3dHYOW7WQ-3D-3D#c3Zlbi56ZXBpY0BhY2FnbG9iYWwuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506077761412542" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3360 chrome.exe 3360 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe Token: SeShutdownPrivilege 3360 chrome.exe Token: SeCreatePagefilePrivilege 3360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3360 wrote to memory of 3312 3360 chrome.exe 73 PID 3360 wrote to memory of 3312 3360 chrome.exe 73 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 4808 3360 chrome.exe 89 PID 3360 wrote to memory of 1164 3360 chrome.exe 91 PID 3360 wrote to memory of 1164 3360 chrome.exe 91 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90 PID 3360 wrote to memory of 4108 3360 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://link.mail.beehiiv.com/ls/click?upn=Lh4BeTv-2FWrvLMAguC7rbeFp6u2eIpWGYpS4FE0ODmku7vFN2dfjNSwYjhvpWFgfpe9NqxrcOT8-2F57csQd33adg5rfWSCVmN-2BYBwdjsGuE-2B1EeakKGEKmojTNvqNtaRFLwmfAqhWkGVZToy1Olpz7RP2phrEX-2FHvyij6oH7OxSdRZ-2FhIjKKXi-2Fdy8EKlmqWy9Hfug_E6Z5pX3ij4jle0fzcoWEqQox9Qz8cnlxaaFn-2B0MRbhKJwOS-2BsLiyG6oDKxPHSsEOT4MSI0yQrSxAwVFMRQPmuUI4lEdMMyTZPzH8t5iKR7RXT3rhowow35wp-2F1-2Fn9NNSJcp3WcEtv1Sfn29tnLep-2FXI4uZ8z-2FlfAkF3vhaYgI7AW1RtzhuBjlNa5QU31WDvCmZxZ2iPkXbnbQlazqJ2r9rD8DT3ddfOLr-2BlwDk6-2FM7lxwCWdTf8E1cQlRmWJylKcWdstrsahsj0BrmxyfvwSx8DdXgtgZV6Dwm5CU7lNjLuhl5Yff4zcR70tun9ClFS90kC64tCkTCNGRH3MXcosccurWs8XdYoGu-2BW8Cq-2FO83V2GeoBbXGsJIokWRpEHxPxo4dlTXdv1JqVxwU17qQZ-2F3B7IB7Q9HVjKFo1V9mGdq-2BgnqlDAVYgcxObqKdeNWQrQ8XTZs3XTejwW3dHYOW7WQ-3D-3D#c3Zlbi56ZXBpY0BhY2FnbG9iYWwuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dc069758,0x7ff9dc069768,0x7ff9dc0697782⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:22⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3936 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3928 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3964 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5012 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4136 --field-trial-handle=1864,i,8630603715660236836,7360883904910235799,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD55affb84623b3dff9509dec8fdd318b9c
SHA106aa1a3fa8f8ccf45290ae3062e0f1d8cc0b4d74
SHA256973c90551c9fd380c91f2514f310cf146a95c49dafd24d9616d746ddaa4f08fd
SHA51279203f5c7bd2107312257ac664c459c82759dcc25c4332f4bb0e2fa0996783c365d1ad521978af0a8ef47c511ec4cfb55d51299d01757f5c4db1204d5faee469
-
Filesize
1KB
MD50e639849e82b7e6280eb5ae384458e77
SHA181141cb3e1d0ba00a928e05a86f38906fe050015
SHA256a23c297e899c96be8bf06351ea9203a49f1856e74d36f57c5d59ab15f87713af
SHA51292343455c85bd02d7d6c2d487bc980ecebc75039db88c268f01ba78cf30757792e06955b198db54fb67827d84ba64a5eba59016534ada261a185065fba0ab56e
-
Filesize
6KB
MD5f3b0fc951bbd61eb7ace59fd5323d120
SHA1e4fd93091a9d3b2dfe339e8643894c15c7a46478
SHA256fb8beae1bd69f351c08ca50cc4bbdeec49f4d0f3b4dd8a11bcd18d5bb7ab3f4c
SHA5121101cef83c59d791760c0b3f1d24c5c8ac120708cd39b11580410ca1852df56e8dd2b2ea7c17f935f824dbc3bc0578caf72fb6804e115c13f67d5f65087f4111
-
Filesize
114KB
MD50f59b953e6c1e22d630af3f18c49410b
SHA186cbd8c27df25095b3f9a37cce9a2657dbc9f50e
SHA256cc93dd8bc0e37c2334be3de4466243c3b3ffc5286dc49a9497dc110ff66d91e8
SHA5120efd817fccbde6fb4687eef80aa03841c035097297bddae8a3730461edfaeb117ff61db8960ef3aa667b53234ccee1d77e62412d6d321f7e890a148b88e2fd1b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd