Resubmissions
26-02-2024 18:15
240226-wv4khsdb8t 326-02-2024 18:01
240226-wlxevada2t 626-02-2024 17:58
240226-wj98xscc64 626-02-2024 17:47
240226-wc9zkscb27 726-02-2024 17:30
240226-v3fyrabg35 1026-02-2024 17:25
240226-vzrababf39 826-02-2024 17:07
240226-vndvvabc96 726-02-2024 16:42
240226-t7vf9sbd4s 10Analysis
-
max time kernel
290s -
max time network
286s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
gato.jpg
Resource
win10v2004-20240221-en
General
-
Target
gato.jpg
-
Size
54KB
-
MD5
cd869039e351b02dde534759ae627caa
-
SHA1
8c227c8532a3106c82009117500a53fceb8adcda
-
SHA256
8fb5890f75d501936e90d1891cd97c8b23396525842fd741f9b9a441405cd01f
-
SHA512
81a5b30497bb3cf7b6257728ef5f04b2e45d1ec23e159035210292b13514a82313e19c68878f50bd10a9382ed5b6a83c6356d2d2c0607a79ec2e8afbc9bc3fc0
-
SSDEEP
1536:g6taN+v7AZswe0Q4qKjLkvqwWsXcWQeldDrVh5Bh0K4:QEAneazLaMWQWdDJh5vI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\~~CB = "cb.exe" ColorBug.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 92 camo.githubusercontent.com 98 camo.githubusercontent.com 124 raw.githubusercontent.com 125 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133534446394877185" chrome.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe 1780 chrome.exe 1780 chrome.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1308 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe 1308 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2936 2984 chrome.exe 97 PID 2984 wrote to memory of 2936 2984 chrome.exe 97 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 868 2984 chrome.exe 99 PID 2984 wrote to memory of 808 2984 chrome.exe 100 PID 2984 wrote to memory of 808 2984 chrome.exe 100 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101 PID 2984 wrote to memory of 1248 2984 chrome.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gato.jpg1⤵PID:312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2dc19758,0x7ffc2dc19768,0x7ffc2dc197782⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:22⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4648 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5280 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3868 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4560 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2812 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5820 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=856 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1652 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=212 --field-trial-handle=1964,i,11846054450598680740,1951554618666325240,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3940
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1420
-
C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"1⤵
- Adds Run key to start application
PID:1576
-
C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"1⤵PID:920
-
C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"1⤵PID:4796
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1308
-
C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"C:\Users\Admin\Downloads\ColorBug\ColorBug.exe"1⤵PID:3952
-
C:\Users\Admin\Downloads\FakeWindowsUpdate\[email protected]PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\88b4fc67-952c-449c-b8df-35518df3180a.tmp
Filesize7KB
MD5751fc6ec15fb25a45c87cef5c7427ec9
SHA1e647e2eafcafbc9f6b334af94a451cf6aa5d7065
SHA256d3031e3f5be22bdfc63213abb29a0ccaa9e74ea21d85a6c8ffe4a1f72d19b0ee
SHA512e7b3d58af648d85c29ebb9d72bc4f034dcb565d232101e74c44e9e17f7977588faddecb3b82bb26bd95da3b81f07cbec18348100909350a46d2826c53e58320f
-
Filesize
2KB
MD546d5de925f141950cdff7ed13f63f40b
SHA1715aa325365d34a52e4165c0cfbba970c119b903
SHA2567df867cf29a07454568d5ebee197ab1688405a27402ee76b0313748adba73ab1
SHA512c60db7fb612508a213bf547d1f490ef7b1cd907881c2beb1a770f73d6ace268a39f3a4b90e90522c47bd371a07ec1308a87b6caa86993c4069c0dc5c9275adc2
-
Filesize
2KB
MD5b0ad61adfd08a901c1a77278160b1994
SHA132d972e2529e8f09933deb741b955fed0601c8f7
SHA2564e1ab909018886d12268ba74b16effdea962fec4e02b6dd3de6c5c2d4efd70f2
SHA5122a8a7a94823d904c689710c6bdb8f85d622595fd15c7f4f7422ec5062e09aac910a10df22afb2c78353b86312d7ae6dbdec20e9998b428c13279bff4e5dde4c8
-
Filesize
2KB
MD51dacd9ef3c8b8ba67c44d6b7cd9a2651
SHA111728d7f9a761fc8ba35cd2cf4ffd820e7b16845
SHA25683edd06c34cfa6c02de4a96436ce9c9276d0b9e7a41e43e181441fe91d067aa7
SHA512d2bfb60c293080012c463af3b68fc172c0c7ff2c022f598a11a4014a2bcc96247ee5f20c7208359fe29a75c15612e8967398bbad1ca9f4e4d96f3710ab509cc2
-
Filesize
2KB
MD58103b757b495a624bd65ec28e5b0e760
SHA13f633f4070daad971a7612c72ad7912cc9d7c0db
SHA256d665a78536ac3d67d511980d1124dcbef014debf1500e70c92954a90e46cfcda
SHA512dafe85218decb9662754345926972bb465e67ab435c30f86598a842b14ee08eefde524aa3d4f38afeb060a83425311db325fdfd6cced316a3f8080f51994a7ab
-
Filesize
2KB
MD571bb94765450332f6c9f24ea4d239bde
SHA1aacf7c563d85c77a7db498102b5dc3c85052d785
SHA2562c0ea687ecd0123deef2044b54dc9b215a8dfb87597b2c6855df79a5cf0da879
SHA512698c8c1923cf565fe8403ae23f58bd779bd6e3769ce86382ab65302eefc8c6ceb2e83d5dc49cc5926df10ec0491d6e86b3d172575b1b687be1c46b212222bceb
-
Filesize
371B
MD5632f5c5ea80ee7dbf7ce40a2bd13a66e
SHA1aae18ae20dc503cb30f0fd26beea2d58c0aa4ad9
SHA256e7e79d0832fb6d3136a8dedd7095a86a91e371392516fd397f6c9da1f667d403
SHA512935daee0ba6fa7b776e5847e89aa94eb5e643b67e48ae974024ed64641ba48757ba10badaaf9a3b2e68831e138f05817a62853b4c7e0efb538b69a7cf3038edc
-
Filesize
2KB
MD5407cbe7e0bf35c07d4e44de71651686c
SHA19ea38f8238b4a9316081c4906057416dbbcc88ae
SHA2567d02568aec86b9924317e5d5dbc5c6e3552e0cc8b18a7fce85f47fad5d1c5827
SHA512180033fff11c899e8d520e63ff07e1e4b570ffb62027badaee87b767f5956e1400047ccef601a940005ad4cfacf82883a4358ad89a2247920b191c75c3daf3ef
-
Filesize
2KB
MD5a56489e13aaa72815b52b2b07df6657a
SHA1a6651266242df16c962a5f1a36126136c9c4e26f
SHA25682f8d9cbaec2e07171b148a17be2f9ddf88dcce613dd10815b49e8409a9fb427
SHA512a2ff2bc156cb25eb5d1a06fc673e97043fed2e2636b009639c2a8a47e3862eeacf218983d5c85cc35ff113a3f7088cd2379046bf87ca24ceeded341dc99bc472
-
Filesize
2KB
MD5ea9b3017b6e3e750f660d5cc4d232527
SHA1de75741d9f11fb231e2ea5af93c58517192a65ce
SHA256ebc471b8229e0a0d168fee7e61ae768808ce70d8040931ad9ae4c26090adbc21
SHA5125a576ecfc3ae2431894bbdaf0b90a70b6aaf2fa941f90d340a6bf68687ea49239fcfefcab2f973c4d53cc32f2e6b3877c8e09eef8f6d85a2588d6ce65f24bd65
-
Filesize
2KB
MD52bd2ed587c59b8ac0c0897044fc2a42a
SHA1ddebf60a5808617c0e5be425a28384d3fc14a274
SHA25689afbe5884084d314868768fc16a204f933233ee3384ddfae236544bbf8169ca
SHA512612abe7a38ed3a2e3ced3c137cf8436e1057f1a41e2f665130df9c8787094a94fe04436d4f36f30abfb8f2180fa470b6ce08b5e1b0cbbb89891bfcbc298613af
-
Filesize
2KB
MD59c3c05eae3f67479bd58fd044c8765d5
SHA1ac4044be5215d8d4baaad37ea617b781466fcb36
SHA256df913b57522420b52a2ec1aab1ea7329099441bd12e83e5a80454a686f0fce02
SHA512ba6f234413fcb4c50db5832f686068924d5cdc3042746919ed7a74bd8e520ad8d0a2a9dda75f77816c3cbc1428608b2b055372ded4552eb59468b89524b52624
-
Filesize
2KB
MD5f64eef4c96608a6087e148737fd80265
SHA1191b6201ae2d8c8ab8f2386e6c529a5113705e63
SHA2562f4259cffc9a0ee4e8d3296b9d46f0fee165997e3ed6cb32acc3eac0f7cb3fbe
SHA512ba933b542c1ebcbf5bfb664298520a318f97c1ab5db28c126885f1a570c3a1258ab43d1743cf0fa4249340f566aeae8c81760134af574f240d46c13d92135133
-
Filesize
7KB
MD57b40f2bfeaa551f6a37c4a4a94e21300
SHA1185dae660fead0e52436c9c0c6d034b70a0089cc
SHA256347d8464c6c9dfdf05a66e462112f1e4ce22a695286123925c1f40b25989ecc8
SHA512fbf9eaf24ec4fa1c923e9f4ed607e9dc8d294acf42245e867506e7c47e46c8571a79d00b33119a3a40a0f1fe423df065670d0e8d3b1374ce7d5fb2875ca920c1
-
Filesize
6KB
MD5fee3037d66c644ca8eefe52695d9f351
SHA17706fa8fe092bbcb2d7d7a529b3f04561de24977
SHA2568c603ebdd3d7e1bc62c6fa7c9e3253b0981b3d2a3af59318cf214de383fe3f9b
SHA51204e14da81fde54662778f67fd7b2c007b4a497719153988ba5716283f492f53cd9b5d5e2e203c6b43e6dd7341591ca211b51bd1ee92f7dce749ce7ce2a0b615d
-
Filesize
6KB
MD5b6206c0f1bd2dd649d486d2f834823e1
SHA16dbc2a726fe02ed87747453a17b709b9c051f108
SHA256d397037b6965ddffefda0c50a68ea92e6d11494f31f17155e52e7d976deb314e
SHA512c6b5faae1239fdddc99004bda9d50737934e0c457a8ac60debd8ae69f25b5410869ef0d6cfbf18eaa874a6ffa4a5fcc446d0e47cd0f844213d6eae7cf964eeb1
-
Filesize
7KB
MD5bbe17ea1b53ec57846307e40e291a08b
SHA11d5de63bdc5e79801893ba1054d2944a980c6614
SHA256793f92d024adf49af55e89be582a3e6d4e1b4bc168c7d8fd01ab71351dbda047
SHA512cb57579e0298f63662a2c0fad5debf3cf2f3b079501e030f48b9a14a069d2b19d451adc90a8c58049d2ec99b6119ddfe8234a3e37963aab48cb474c3b3cb2744
-
Filesize
7KB
MD5261418bbfa7ff5404f33665f5b8ec159
SHA1b033fc3b49cea2b2239367ff7413d16a4ec2712c
SHA25648cb51575851596fa2b49b33b4c9711045c9f9324f70e76f0b0f2a023b8ec35f
SHA5125ade5866180f04d3ded0da0e48c0b1db27a50e3c4405946922c9a5a3c07bd996b353f4dbd333484f0f590661a39ab2832dd3ae8ce983b0a2a0a861ba3c279c5c
-
Filesize
7KB
MD503d385d6c04d1cf3140017273421783b
SHA11ebea4f82c00ff117607805caa3d9c3bbd131057
SHA2562c09f3d51ee70ee0a7f68f980e72eda85cf55b295fbcd083b3b93c7617b99a6d
SHA51270f07a3db9c3424b28ed442bca4c136b4a698001576d9a862f065d02fd4e36a88b1c69206f2ed8010afe12adb449eb78abb75d7a793efa31fd4049b0db0160d7
-
Filesize
6KB
MD5e0337e8a99278783ce45c5abb0c84ed0
SHA1315f744d37c19503332a2ed56b8274832a8be45d
SHA25662226f29dd5ba009533616757d102774e98e1e65ec688232b352e824c0b15254
SHA5127e1e963a03061e41d813173a8332f745bed1bfa447670cfa5b5cfe57328dfdaf4974412d8340af7ed05115064c8f34448780b335ad3288b7cf6eec29069c72e0
-
Filesize
16KB
MD562c809ec7db3b77290012afdb14a5a81
SHA1761cf535b22f6018709690593047f42ac0e5c2da
SHA256b01e5df99a3ac29925cef4a91169062f8c3f6a7f7ab2988e28553d9a73b77627
SHA512533d43884fed9a7726d0e5791e4cf332cb5bc7be246ce74a7857139e45f8a2e386b3c6eb552a700253aa5cd4731aae3f2c0ca471ee78b920c1826556af307b42
-
Filesize
16KB
MD5e37577e8e3222e869186302da3e7a640
SHA151d5b33271a2e748b5e1478a724c543f6e1da6ed
SHA25676c3ef8dcbff6c013df5295498ccb128cbb85a95263c9317e896045d57f766f5
SHA512d949f30af1d6979232a45982c61a8e4f6b5fc5b1f803333423e5bd85bee0d1afd0e9554ec864f10167b7105edf8cd1fcd68505d1e63274ad02bda44a81705f03
-
Filesize
15KB
MD505fd7f1e7a4cbe676cc04b75e415d7a1
SHA18dc786acca19c1ef8dc2d6413a538c77153eb887
SHA256217e612219ca47913a0460dc21bc2600a63fc04beac9055276656bdf281dda77
SHA5121d04af63d06bf164d544060d289cd6f63cb05c63b3d2d4b52a657e8e0f7163cdb63a5129ef9288d061e53754020508a73a8700d7b14d51a9948d2a97673ba9c5
-
Filesize
254KB
MD52e71a891fa43785553ca66443df6179e
SHA158723f734e5f7d0492ab0e10101cfbfd56fbfb7d
SHA25600d440a2332e83ecfabd64e2ac7a40f3c839191310db7cf5e582493878118811
SHA5129772261fa35f910d8ed4dff945d0a4310517d88ee90982fc41be14f26a786aab691d0e8bce35c1dc63dc1eac10c44b2610d284d46e41b00d203eeb0c63a73cbe
-
Filesize
104KB
MD5dbd90d72a0bc050ffd5a0378ba954124
SHA1de3c895678795574d7767ce3a74235ebb11e71db
SHA256ea9267acac38d1ae8d7d0e26563476a9ae68416aaaeebb27ffd87a0ac5906cf5
SHA512fc7c96fa64928f9298211e42b9bde0cb05946c0dc40502a5a4650e2d8768b0822a46fcd274d177648a9d772a71460e7462bb9f21c1d614f266df3028e405e47a
-
Filesize
99KB
MD55921fef6c0a749909dd0e105ab542e25
SHA18c2912501351393d7315ca7343fc619d1b2e83e6
SHA256246f9aed073a1521a06e230ad44a9f1057f7a7c2e65dadf36f8363e49ec726bb
SHA512859de2c402094a48a914caf8bd60322fce69784a480a853c895fc00c0133253191bb4bbaa3013186387e770d2bd03db4467840e22dda0cdfa000066755705293
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
241KB
MD519851e369fc50763189442e3c6694712
SHA1d2e47f277743f3c4253bc2ce85bb40cc67c87b8f
SHA2568a9d0115b56f9a6a8ed231d3400e1362425e265e5944a0ec0903a70e888ab171
SHA512f79ba6f1219f8e10cadc3a4a5c8ab2051affe3b9bf7a4edaed505dd3acddcd57327f6cb1f728e37a74a78d685a9bd244313a629cdffea58a219a7eb4615f31de
-
Filesize
28KB
MD534071c621da9508f92696709d71bb30a
SHA15817a14b8da5da5aecd59f5016c2b02fbbe2f631
SHA256ff2e6648e019087c2ec3c0f9eab548a761122b696caca171ab88e414ba5615cd
SHA512eb4c3b5ce9a4d6e979565d44c1a1432272bd2b9d1b83ca6b03ddc9982a5a6c341126ba71bbfd0e8d443ffa93265b6d205c187f586ff0bcb708965d2db6c98b45
-
Filesize
604KB
MD59e94a2a8c092b611420f8bfdbac7beb8
SHA138e21ee8cfa81fd26dabfb0923b108b54db6f409
SHA2568f8f4fba17fdb1538ddff73763cf6bac274f2dd1fd53c4656d45f496ce690f12
SHA512dc550716d82bbd3f44ad25f67d8d894d94e5cc1e15c996c9a6e3d9fe5fa9acfe5d2b9134736d72c4e2a72434298e6419987319242776e7bd68e0a87783c0fef4