Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
21/02/2024, 03:56
240221-ehdpwsbf32 321/02/2024, 03:52
240221-efkenaba6z 421/02/2024, 03:49
240221-edm3rsba2z 3Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
A1.py
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
A1.py
Resource
win10v2004-20231215-en
General
-
Target
A1.py
-
Size
2KB
-
MD5
d5fe66c95538284c75363f4b0c8d4581
-
SHA1
40714520dafe2c27560f2345e830276b5a5eecdc
-
SHA256
006b8d042862590447b34e6c5bb2f196e4e0fdeffd95734fd0de1a7b07e6e507
-
SHA512
e39ee887708d5ab729bceb42c01ad6cb36666907f4dec772e4852694f7b62e806537eca1229b63fe1dfb37e9acbbee1c5cd359ca4af757cd6fe9c2601e590a93
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\edit\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2796 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1792 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3008 rundll32.exe 1792 vlc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1792 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3008 2496 cmd.exe 29 PID 2496 wrote to memory of 3008 2496 cmd.exe 29 PID 2496 wrote to memory of 3008 2496 cmd.exe 29 PID 3008 wrote to memory of 2796 3008 rundll32.exe 30 PID 3008 wrote to memory of 2796 3008 rundll32.exe 30 PID 3008 wrote to memory of 2796 3008 rundll32.exe 30 PID 2888 wrote to memory of 2876 2888 chrome.exe 35 PID 2888 wrote to memory of 2876 2888 chrome.exe 35 PID 2888 wrote to memory of 2876 2888 chrome.exe 35 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 1452 2888 chrome.exe 37 PID 2888 wrote to memory of 280 2888 chrome.exe 38 PID 2888 wrote to memory of 280 2888 chrome.exe 38 PID 2888 wrote to memory of 280 2888 chrome.exe 38 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39 PID 2888 wrote to memory of 1968 2888 chrome.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\A1.py1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\A1.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\A1.py3⤵
- Opens file in notepad (likely ransom note)
PID:2796
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5f39758,0x7fef5f39768,0x7fef5f397782⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:22⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1392 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:82⤵PID:280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1588 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:22⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3272 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3676 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3680 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1112 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2024 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2636 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3012
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideImport.wav"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1792
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\DismountClear.bat" "1⤵PID:936
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\∞1⤵
- Modifies registry class
PID:2844 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\∞"2⤵PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7e87eee0166b896f4cf8b3433d01ddb
SHA1bc747e7a7b403b8035c14072a1e06c9815886dc8
SHA256e06cd1c9660d3384e003b9656a64eaba108fd526aa542a762bf6601689bfd202
SHA51206600b63c1b41559196b7e01eea5db7838f0e0c5e14c5543d59d242542bc0df27e4c1ba96e2d4f5e49b8dcf5af1626efd5ef149059d18e650d5054083c499a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2bde1bf170221fdb4d21bfc9f5f270b
SHA1a611308176804206b7e514969042c67391fa9eab
SHA256e5dc565722633d39906e631510e5220db44c85f85338974a49cca46def71aa14
SHA512ad97bfd3a302efa01300451b2e11f9fc8e39ee4fa5005a705a206f6787d87dfd2511491d4569898ae16ad56582f11642c52be3504433b16b5eee62b3aa136f47
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD523804dccee4ced4b2e98b46dae35e082
SHA1adb6d6e5daf43bc1fa774c91ebc811f4213c6936
SHA2564fd6e98609325b6418a11bf6398157e3423098192601a5636447c39b5df8f31d
SHA51291adef443faafab719fed98709e9de6a1b806df54200ee0e39929e38474d0cdac7665f463d178ba77aabd7e754ef12bf052071330af7ecbc82eb6f25f90f7e67
-
Filesize
854B
MD514ab7f84926082f89d0daa1086dac740
SHA1fa869fd963e966cf38bfa4800f63ac1ad5afccfb
SHA256a56616a7689b49e03f9861cfa68fd845c79c2d2e5a5af5ffce225c7985e5ae8a
SHA51238359de52007d5a0ff9455952d20f76b09d81a49e768b5125a2a40d0c4581a77f15aa820e643c0950e2fa5122e9de0aceddbc6e39d4b2a758e407afab8dc2eee
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity~RFf77cbf6.TMP
Filesize363B
MD54dffc7763a6a7356665248f26daf864e
SHA1ac3bbb417088665aed6e532d5c283cef8f25349c
SHA256fe878d1de260acbec5f3d526997f5ac0b996f49a873182c9ee57af93588de0d9
SHA512a8e053f09bcb0a2490c9044836213e0037595a984024811bb5f1d4da97f59dfff4bb293b898a7c1b670ace971fee6846862a311ef60c8dae84bd62f24e6cbbae
-
Filesize
5KB
MD51a3f56bc799bd991f0a416174c0b7a57
SHA153634eaa878b08626a98ebc7fb452ebd70a54220
SHA256bf2a23c8f5c58d93daf4ac603bf5584c0f6f2919a2e55b0c3a88bca14aaa2234
SHA5124ac116478fc101a9f615c5f0151ce8d9be50937ebf4f2ab154ef638fbd526c7b5b8a2905024da3f97ee283a770d211917509c41ab3a3e1ae3ee823cc3af83eea
-
Filesize
4KB
MD513ae96031f6a5cbb3d10172afd242b67
SHA1f18980c32d7866d03b90a15ba9d2d542f22dc59b
SHA25600b6fefd148b1c9929508c3b33e25193e4b05afecfbd3740525c41df7b8ff9de
SHA51247e0b56070efd6b219f420654f3135bbc22ac83a61c232cee8d4f06352c2643681c9b63c270b4c693e0af3a24d8a76242076059aa2e8d38f723bc6c63f29f779
-
Filesize
5KB
MD56c034e3a8f919c71eece4bf6096e085e
SHA12559d383a9208a11eb13d6c1b4c2e07557221e1a
SHA2568ce7ad83abfbd50850a4368d64473516f1f0a20ad6da078968e08334c99771db
SHA51266774c7cf412d873ccac448655d033fa72e87176690b818cc3a1908b2001d051b9c47804471a71b3ef639bd68454b3ad546bff1913c7c428d4c13ece073a0cd9
-
Filesize
5KB
MD50ed39f137e64a74ab5c67dd0e64c04f4
SHA11e8f7d179a8cc67a963e6022f5f873694ba86478
SHA25646c4aaa4a9ff8d327fdb8d7b2e7210b9e1f97375e056834e6b30e3972a1169fa
SHA512d2b8f2cab9a4592d8dff0b30a4dd1057de0940d9cd3ffdece6a4179ba19a4fb16c57a91c100eef086c4f2099091a82e3db2664a586bb7e86e93de1532c87c00a
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
240KB
MD559ef3be22ca3193e669b14fd0833e108
SHA1d20262684c989b0228734b50591d814ddf044677
SHA256f3e47b320d2f8c95353dd9adc92c290284d8ec7132577f2014aec7dbb77dfbd3
SHA5128b077d27dbe04729334b5615d2274839d12bac2235e238d890e8cfbae6c41d413bff32d6756b0c5e22dff62f7342f651da71005706d51c57a739fd2d7acb7f7f
-
Filesize
240KB
MD5276efa60aecda36f9a47c229a62d5687
SHA13278393696494802658ba231dd834a49b9ccca27
SHA256cb80ea7b8fcd1df63fce79808109a8720b0a2142798083e2d3961fc1fa056758
SHA512fdbc6bcf14610e5267d3650f6748e22a4af474eaa2fabe4b751ca1ad01404c2c6104b5036406018d893629182b31ff102367c47084ba5dfcf0dcc23998da3fec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD503cc87920689df3a8783c384227dfc24
SHA141773b27347e083605cdf97c4f9d4ab99d978bf8
SHA2565ba62f9a3e019b4a4d94c186ea93e90392dd40d7a7cccaca13b0a64822d684d9
SHA5126ed231775cd399b0170a22635d4f02a034cd49739d339571ba04d92398b334cd2383bd8b615365f69555891c518d9c54848391b89fc58ab5c5c71fd43f594716