Analysis
-
max time kernel
130s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 17:04
Static task
static1
Behavioral task
behavioral1
Sample
Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe
Resource
win10v2004-20231215-en
General
-
Target
Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe
-
Size
133KB
-
MD5
0e525f27ba5a4c4d0ebca64a61174da0
-
SHA1
c98cb1a9b04c685dafd486c2f51023653f4e763c
-
SHA256
d7a06ef8fdaaafedea3b522b7411bede856bb1d0f18d8b7216c20255947ee517
-
SHA512
108bc37bb02e2a347aadb81ada4985f34fe96cf7a8c61885418a6601867289494ce4d986982fbc4752b12ee018cdb24b11d090cf38b6f34e51e72493da46ff81
-
SSDEEP
3072:j/Mi8bgXxbzsAQmxtM792e3lHV6N6/bSLmW3u5mW3uDn:jUDbmbzsAQmgvlbBb5mbr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414524171" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{106DBEA3-9B51-11EE-B3A3-EEC5CD00071E}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{070D04C1-CF49-11EE-B3A3-EEC5CD00071E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2272 Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe 2272 Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 1636 iexplore.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2724 2852 chrome.exe 31 PID 2852 wrote to memory of 2724 2852 chrome.exe 31 PID 2852 wrote to memory of 2724 2852 chrome.exe 31 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 1920 2852 chrome.exe 33 PID 2852 wrote to memory of 2548 2852 chrome.exe 34 PID 2852 wrote to memory of 2548 2852 chrome.exe 34 PID 2852 wrote to memory of 2548 2852 chrome.exe 34 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35 PID 2852 wrote to memory of 1008 2852 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe"C:\Users\Admin\AppData\Local\Temp\Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe"C:\Users\Admin\AppData\Local\Temp\Zoom_cm_fo42pnktZ9vvrZo4_mpvO3WLryHB+pXxvx3I-BNrdqHnVvLdMz7q5F@VY+o66Y7VAEWthp6_kb14d362cab0eaf21_.exe" /normal.priviledge2⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72e9758,0x7fef72e9768,0x7fef72e97782⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:22⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1568 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:12⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2840 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:22⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3236 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3476 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:12⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1164 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:12⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=1300,i,14840471598642757718,8096992097675463062,131072 /prefetch:82⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2908
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275463 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5de91ec2311dbd9a6731cbe7a38bdbe4a
SHA1a31e1a4a75353f8932b4bd768e2537b6d510a746
SHA256369d66113d858f93fb38f319b73825306beb402739e81bb02305aa1be8bcfc28
SHA5127e2b32971fd55aa2f67e3dd0c5689574a64ddb0923d785bb3229f82a70afe4270d1f5e117fb5475a22cfe2586c18ed2e038ead7e03db0feab203fa61521e5236
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
114KB
MD58d4902a9150ecc811a11eb0ef7cea9d4
SHA1478e5b3e4aea3897e393f180bdbbda249bb66a3b
SHA2562b90226ede1bb5d99f1d8aff04b57061b927deeecd87b1ea2c0d06ae390ca9ba
SHA512d4172abc4847bf9bd18b529e9a505bff80620c6277ebefad534ec777572add8e833f7645b5f6cfa9fbe0df1a3b6d35e8b0662e8aa7ba9842ca5b4e2c8079eb1b
-
Filesize
114KB
MD5183a463050a2297832958fb81c8bf87d
SHA188daa1ace3ca98f1a169fa074b0529c5d10c2560
SHA256c056ecd440e55395cb329aaaadeaa2261f68a8dbc0ae4e10cb0d3fed4a1d43ba
SHA5129c40fc7c81e39f410d66a5af49f5436c267c8229ad9f1249b838fbe7d70e746830b1c8c7a5e8a492e0f2b265b38b5fbed257e4f193aaa85ad802c5257a1537dc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d