Analysis
-
max time kernel
21s -
max time network
27s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/02/2024, 09:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=elturismoencolombia%E3%80%82com/wp-includes/cssws/Zy5lc3Bvc2l0b0BsaXN0LWdyb3VwLmNvbQ==#%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E&e=0103951489&elqTrackId=fphbmrmekqnbyixvvjeu&elq=7##char20##&elqaid=208402&elqat=1&elqcst=272&elqcsid=1506365
Resource
win11-20231215-en
General
-
Target
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=elturismoencolombia%E3%80%82com/wp-includes/cssws/Zy5lc3Bvc2l0b0BsaXN0LWdyb3VwLmNvbQ==#%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E&e=0103951489&elqTrackId=fphbmrmekqnbyixvvjeu&elq=7##char20##&elqaid=208402&elqat=1&elqcst=272&elqcsid=1506365
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513404187810858" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3184 chrome.exe 3184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe Token: SeShutdownPrivilege 3184 chrome.exe Token: SeCreatePagefilePrivilege 3184 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 2352 3184 chrome.exe 20 PID 3184 wrote to memory of 2352 3184 chrome.exe 20 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 5080 3184 chrome.exe 82 PID 3184 wrote to memory of 4800 3184 chrome.exe 81 PID 3184 wrote to memory of 4800 3184 chrome.exe 81 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83 PID 3184 wrote to memory of 1892 3184 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=elturismoencolombia%E3%80%82com/wp-includes/cssws/Zy5lc3Bvc2l0b0BsaXN0LWdyb3VwLmNvbQ==#%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Biglxjhdj%7D%3E%E2%80%8F%3CSTRONG%3Eiglxjhdj%3C/STRONG%3E%E2%80%8E%3C/FONT%3E&e=0103951489&elqTrackId=fphbmrmekqnbyixvvjeu&elq=7##char20##&elqaid=208402&elqat=1&elqcst=272&elqcsid=15063651⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff92abf9758,0x7ff92abf9768,0x7ff92abf97782⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:22⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:12⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3392 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4852 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:12⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1944,i,8794386560641276709,16325031880048115133,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705B
MD5e0b5fceaac25881abcbb9000273ffbfa
SHA173805116fd9d72124c0edc7610d443d002b7b463
SHA2560af84ecbdedc4fba0a774938e9a2344d519d274aadd505e3e4c5d4198a8707fa
SHA512f24711361647aac833c8346403f96829ae55740379f510f5e29abcdf56cb63c8a2bf528da008f333c2b4d2410125bdc124825d3b9cc71bd6c82c2c4a13268882
-
Filesize
6KB
MD5348d0dee99b3ddcad3475ecaf2405874
SHA17aa8c42fdf4e4dadf26f7026849ac288149bc23d
SHA2560f8637cd0504cc8ccac88851973ca9340c9ff875336311fec55a1c2154530c20
SHA512a63b1e61f634d930938e059703d327662097f2b13976a2ad8bf58ec74e9f002e4e291bfbc6fd62c875f47d17f7e3d0b0e349bbc7592507179dac8f4f02824d0a
-
Filesize
114KB
MD5eabd79f8b11592e8aeac4a7fe152b063
SHA171927056ed1c49aaa30059483a87dd4d22cc9570
SHA2560858c499ecf38ba70d944c669bbbfe3a13195d6ee323cbd6ac44b389790c669c
SHA5129515f4d96607dae6ec617002fcd85cdf406c91097ae1e6e26b96a28edfaa5d5d466ac266ffb5189f402b058aebef76f12c168d6ca22bcc3fc579fea6521827cf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd