Analysis
-
max time kernel
1804s -
max time network
1704s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 17:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1213895613779808328/1213928854133932094/tos_cracked.rar?ex=65f74258&is=65e4cd58&hm=fe7b192cfde2b0027ec544a1bb61c0a1e108dc216fd6b4609c3085c782476709&
Resource
win10v2004-20240226-en
General
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ main.exe -
Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\windows\system32\drivers\VBoxMouse.sys main.exe -
Looks for VMWare drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\windows\system32\drivers\vmci.sys main.exe File opened (read-only) C:\windows\system32\drivers\vmhgfs.sys main.exe File opened (read-only) C:\windows\system32\drivers\vmmouse.sys main.exe File opened (read-only) C:\windows\system32\drivers\vmusbmouse.sys main.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion main.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion main.exe -
Executes dropped EXE 4 IoCs
pid Process 3068 loader.exe 2700 loader.exe 3692 tos.exe 3804 main.exe -
Loads dropped DLL 35 IoCs
pid Process 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe 3804 main.exe -
resource yara_rule behavioral1/files/0x000a0000000230fd-116.dat themida behavioral1/memory/3068-117-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/files/0x000a0000000230fd-118.dat themida behavioral1/memory/3068-119-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-120-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-121-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-122-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-123-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-124-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-1035-0x00007FF602310000-0x00007FF603153000-memory.dmp themida behavioral1/memory/3068-1084-0x00007FF602310000-0x00007FF603153000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA main.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 97 discord.com 98 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 94 api64.ipify.org 95 api64.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133542212028860271" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe 1652 chrome.exe 1652 chrome.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe 2700 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 1540 7zFM.exe 1540 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2124 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4372 2868 chrome.exe 87 PID 2868 wrote to memory of 4372 2868 chrome.exe 87 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 2704 2868 chrome.exe 90 PID 2868 wrote to memory of 4084 2868 chrome.exe 91 PID 2868 wrote to memory of 4084 2868 chrome.exe 91 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92 PID 2868 wrote to memory of 3344 2868 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1213895613779808328/1213928854133932094/tos_cracked.rar?ex=65f74258&is=65e4cd58&hm=fe7b192cfde2b0027ec544a1bb61c0a1e108dc216fd6b4609c3085c782476709&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc93d9758,0x7ffcc93d9768,0x7ffcc93d97782⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:22⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\tos_cracked.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4632
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3364
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2124
-
C:\Users\Admin\Desktop\esegs\loader.exe"C:\Users\Admin\Desktop\esegs\loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\loader.exe"C:\Users\Admin\Desktop\esegs\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start tos.exe"3⤵PID:828
-
C:\Users\Admin\Desktop\esegs\tos.exetos.exe4⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\main.exetos.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox drivers on disk
- Looks for VMWare drivers on disk
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:3872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title .gg/violators6⤵PID:644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title .gg/violators6⤵PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"6⤵PID:3304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cls"6⤵PID:368
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c95c46b6a5243f68f9f8ad09e1c2d329
SHA140a1fbb74be50ecb37f12062dc95ee6acdc479b2
SHA25675788a53793ad4de39d8d91fe4d0aa622592df21d06dbebb75de75e0f1299196
SHA5129ea83fbacf0e8cf29c46a1ca5465cf34321db47086a2962c9644c73e3d77ab5dd68ad152b38761e474bf4c9f251e390e6d5198f68e1f0564363e3094a9fcf5f1
-
Filesize
1KB
MD55c9818d0b69280f65b798b4f3ee1bd67
SHA1865d4771ef2dfbb934556db8969a3a8dd134de53
SHA25606bd8b69f7af5b167b3130d05b8f3766f8ca9ddf4c48b3e93a08e15a8a5c9186
SHA51284dd271d7a267262491bccc12e39a9bcbaf55c8cfef32ed63a0cf843b3490dc0cac070f30e979fc378570622158ea2fad635c613c5bf452ed8317ec2b4e9cdb8
-
Filesize
6KB
MD5ab6349eab93d2f30bcdf19c7c08ed120
SHA154ef1baa43f454a624c0e31370246d6931d3c6c5
SHA256444de6b991dad249fddd12b7cf65e2800a0b727a3dfef58bfd50feac8d657f7b
SHA512ed32a4bf136a1ef9bc1b4fee09687d59a8760aa1aaffb3a1603af4862e9ecdeee5a8d43c9fb3a73235ba33fd619048e1999a71aa4c81682bdb01e6fd7067c560
-
Filesize
6KB
MD541420bb3510666b060119374d0932fd1
SHA1c8890e9f162e11d492a00219dfce158cece0a834
SHA2567e544a0a9aa2661127cffc98faf808c04a7a8cd2680aa7884384212cfdfeacbb
SHA512487bff349c97cf3c4cbb394af9478d3707691ab0665bed76ea794cf543a50d209ffc79fb9bc451f29465f7b8562b4b767c9e44455b408cf0d4098e8766cc0e9f
-
Filesize
6KB
MD575f8042b05f39cc202fc36d297e46281
SHA18eaf2d54813fdcd81d37918dcd26b239f145862c
SHA256360479d43e79a2fd52bf3e7e0446d938db7b50443ff04029d3a19569ee262902
SHA5129fda07347335476ba9b073e565e6e9f4f8c708a9d491f027c8ab016341acf20e0651a391ecfb7f49958fccb920361ebabbbc77d9027c71598ca3951f6003567e
-
Filesize
128KB
MD5beef2ab7a199184b75397b10dc8766b7
SHA12fd81de42855e3ccb1eb835f291c719d68ce17d3
SHA256a903a1162dec4cc3f4318f7418773674fadd23c464792a3ae0712f6914e656d6
SHA51224ed207a8dec6208c89e5d5a6d50ef84e50acb934e3324f595a21cb3a723922a0def4979b1d502c7cf825f4e80ef3b092d2755eb18f324b40c1f4ffec00b9c5a
-
Filesize
114KB
MD5dbac6a83fb2d47074874f8bffaef1a41
SHA1b17719ab578faf6423dbb58dbc8a1bf6476a2aa2
SHA25619e4684ee7cb27a60b1a35e770cd5a940d8bbc11f8695ff9b2b7ec4e566dff10
SHA51208dbda5f6e1d1bf1b969fcecf39c975b97f2128f95c4e415456ea6e2e425f178b1ddc09224d7256ba994c7b4bd9e81693670f09be72d3ff1ae9caf72e679c128
-
Filesize
110KB
MD54e488525c61ebaf70ef502446febb63f
SHA1f46468c8c76a7f9a303282350750873a5948b6ec
SHA25651521538f1a40f01ed9c36b58502e8e5106f03a20f5c7a85ae685f85ceccbba7
SHA51214010a7ddd74698a43aa1a0fec461c1765a7cf94410d6331c054fb59c56dbcc656e5d9692c2f35d0a50c6ac505b3e246cee16b6792e6c40d35a1d450064ebf46
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
120KB
MD56a9ca97c039d9bbb7abf40b53c851198
SHA101bcbd134a76ccd4f3badb5f4056abedcff60734
SHA256e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535
SHA512dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d
-
Filesize
76KB
MD5ebefbc98d468560b222f2d2d30ebb95c
SHA1ee267e3a6e5bed1a15055451efcccac327d2bc43
SHA25667c17558b635d6027ddbb781ea4e79fc0618bbec7485bd6d84b0ebcd9ef6a478
SHA512ab9f949adfe9475b0ba8c37fa14b0705923f79c8a10b81446abc448ad38d5d55516f729b570d641926610c99df834223567c1efde166e6a0f805c9e2a35556e3
-
Filesize
177KB
MD5210def84bb2c35115a2b2ac25e3ffd8f
SHA10376b275c81c25d4df2be4789c875b31f106bd09
SHA25659767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf
SHA512cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f
-
Filesize
30KB
MD5ff8300999335c939fcce94f2e7f039c0
SHA14ff3a7a9d9ca005b5659b55d8cd064d2eb708b1a
SHA2562f71046891ba279b00b70eb031fe90b379dbe84559cf49ce5d1297ea6bf47a78
SHA512f29b1fd6f52130d69c8bd21a72a71841bf67d54b216febcd4e526e81b499b9b48831bb7cdff0bff6878aab542ca05d6326b8a293f2fb4dd95058461c0fd14017
-
Filesize
155KB
MD5069bccc9f31f57616e88c92650589bdd
SHA1050fc5ccd92af4fbb3047be40202d062f9958e57
SHA256cb42e8598e3fa53eeebf63f2af1730b9ec64614bda276ab2cd1f1c196b3d7e32
SHA5120e5513fbe42987c658dba13da737c547ff0b8006aecf538c2f5cf731c54de83e26889be62e5c8a10d2c91d5ada4d64015b640dab13130039a5a8a5ab33a723dc
-
Filesize
818KB
MD55cd8cbde51c687b96a732c6cab46b016
SHA19584be1465af75937f9cff3c6609ce2f6228498f
SHA2569d007f4dd7e138404aa849eb1afa8637b8d28606f7e3349bc99fb9279184319f
SHA5121f9681c65f8f803d7e150c03a126ccee715e680035b30d0dcdcd538735d2e294ee8766f5afaa4a2d663eb5da13ec85eef01f57d967753f09649017911fdd2d27
-
Filesize
2.2MB
MD57085527dc662ae8a458fc41f9d9f6b14
SHA165d0696664614c0aad7fec2900132b338f46dd55
SHA25685e3a3677d14fc301b591e19ff43de4ead89201f2ee464852667b170dbf7779b
SHA51209161a3d857dbe9b831aae657e43fd3101cac12c76c99e0164387c46c8d17309a1c9b6e73e4658cb50dbe48a4b2f646ce6205c8ed13530e8f4413301c0dd4e3b
-
Filesize
686KB
MD58769adafca3a6fc6ef26f01fd31afa84
SHA138baef74bdd2e941ccd321f91bfd49dacc6a3cb6
SHA2562aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071
SHA512fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
Filesize
34KB
MD532d36d2b0719db2b739af803c5e1c2f5
SHA1023c4f1159a2a05420f68daf939b9ac2b04ab082
SHA256128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c
SHA512a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1
-
Filesize
2.3MB
MD532c57cae130dbb6e6da0b3ea4b3cf665
SHA1bfe4bf3c5cd0c998e1457e3a627c18720df5cfb7
SHA256ed7c2614500c88eb56f6aba483c9b472692b5f2c88f242315ee27763a19dd6be
SHA5127bf3489271ac471e043e4007de9a6c4084ca33b597dea8fafa50249fbcef4a97688148169d463968a709c7b195a3e5350233b466884a3d545a8afb656138cf9e
-
Filesize
2.3MB
MD500b39f0580a0177451226153a9c80aa1
SHA12c2a4b84bca9a0426ca6143dfccdef3e48f76f87
SHA256e8a307634b7bd0ecec08b2b99840b23460dd313205c91f8f8b67260cea3b6901
SHA51254e7434689d811e9bbfa7a4cf129babfe01425535c081eee26adb553504e7d4e990f07f36518ec5d4e2699c5efee3e60fcaec0953d895458d02598ee45185333
-
Filesize
64KB
MD534e49bb1dfddf6037f0001d9aefe7d61
SHA1a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA2564055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856
-
Filesize
1.9MB
MD58f11343383a676f4044713e319513119
SHA12c0619b8f8186a7150cc673f954dd08bde5cfa87
SHA25675c8cd336e93a1b9034a9369072e772668535776c594aea6264cab029c0f1b97
SHA5129dad569e3f278d94ec379c02af1e2f20d51e725df992fbc7ba7b725eaa5c8295d164763bd7a1d5efee10be2f0955539aa3bb51cfa091d591ede8a5e7d7512268
-
Filesize
1.6MB
MD5a1c4a7b91af71926b8e8923348c35a9c
SHA1358d47f5b5037d2b45767b8d80d225da3c3d516e
SHA256ebf730646c27594e8f463816a634f55b671942b3f73b7b38f9a5a158ab515682
SHA5124f0cb60a2fff4c8b7b5d6107672533a7c853dedbed634064c38bfb4d2af6f28d51534574eccb21ac182455b702957eb5d259be7a460eb5417f0cd42bd859a16b
-
Filesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
Filesize
62KB
MD5de4d104ea13b70c093b07219d2eff6cb
SHA183daf591c049f977879e5114c5fea9bbbfa0ad7b
SHA25639bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e
SHA512567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692
-
Filesize
2.3MB
MD5207f40044378e15068ecbee08c21f449
SHA10db6abb9eebede035ab0f0b4914556d1f1931033
SHA25674b28881a46def6f7b7e8de539122ed1c5460da15df638046fb1463e2ed1bd3e
SHA512cf9e9ece3a411096794426c3e47f5306bb071d203248f093eab224d9365c6277ba65619283baba2734a2790506a08a4d1f33c7f84aa356a7a5663b75134c2522
-
Filesize
1.7MB
MD5ed2850cb48ca2ed0b103f9e77b30761a
SHA1f9a0b9848975494271554d86e89d2250e9c0ddfc
SHA2565dd58cab32f120d3b06fd9bb5e4860b26e6201591ca25ee7d13161c88db527a9
SHA5126f51c2d8e04b97aa9911f157215aff06930b7469cd147ff60d567d34a0a2fb95ff30d7d87791354e425c1c90a8c2e15610cf0cab8dae21d41df4f3865badf40f
-
Filesize
4.1MB
MD5d0a2fe0bbe88fbad48319085420d7c1b
SHA1db289c57ffd5d377e9709885c32aba456b0d415c
SHA256fb85fceeb41ff217384a645e4412e716a058a94da01245cbc29bada1a3872d99
SHA5122f41e4f4e94c523add2d9d7d1f8db21a387461af3058093cccadabc52f28396d363ce161b03f0804479d855204f4ac8bd7096a60c66e8c2a6ac76f82abe37541
-
Filesize
4.6MB
MD5c8a633a8a2f5184c5a742a18b50923f2
SHA15d00c6d36f9ff9dac24c088b405447468b1526f2
SHA25632ecd14db1f6a692baa966e16cd04e1bdb07dc48c45c01916847fca615205f02
SHA51253a21298be3127a385521dd84ff28927d74120428f9ecf701c7e2ceef7ef16d945b86a05982bfde858c72742434bda49a1c1855b37fdff4f5bb5069ac23108ab
-
Filesize
3.5MB
MD517bfb932156fa49aecd0965c24257b48
SHA1d730e7b30fc056441ee86b31176f9fa6a15e0a04
SHA25694a585d23a2e9c25400a3983506ed6ec502696e297dd54c2e3e8173b7d725d58
SHA5124dc81bcaf92713d7b2cb6fa967779810a6654d10afdfc68bc7f0418f2a7a35b5599e6bd264de02db652d616bac685d9f38cca1d3c616296b82dd73309e926f21
-
Filesize
3.4MB
MD5d29db95a91585f9087dc4286f33a656e
SHA14683ed4c6b4b8e4e465e118fe7538590990e5e7a
SHA2560f579f382439681590e2398d4d5ea3c2b612ba3a5221339c99c3be908154aadf
SHA512d2eba2c47a866ab2020b5e75ada620d55d045fcf6b8d4cfd154d411ce4458c2a4ead9767d596aab86820b676a9a7f511cb868e01739ca9105fac7c7443fcf1b0
-
Filesize
512KB
MD5dc08f04c9e03452764b4e228fc38c60b
SHA1317bcc3f9c81e2fc81c86d5a24c59269a77e3824
SHA256b990efbda8a50c49cd7fde5894f3c8f3715cb850f8cc4c10bc03fd92e310260f
SHA512fbc24dd36af658cece54be14c1118af5fda4e7c5b99d22f99690a1fd625cc0e8aa41fd9accd1c74bb4b03d494b6c3571b24f2ee423aaae9a5ad50adc583c52f7
-
Filesize
1.1MB
MD511d5a2d6d52bec70e6501671321518c7
SHA18786dc65c32fd0b0f9d1dfb69cc1d9c4d894b37a
SHA256fa1e6ac0046a258ed28079c06d88c0c6b1f84bc2054953af559d2a932597edef
SHA512dac350da40c38a1f95eedf5af9860c7c67cc2817dfb8b7839dc733b03dadf24b50e88714e57d4035c4a1f57d3f30af62d62150b9ec978f1b2bb65547bc59b698
-
Filesize
1.0MB
MD513dfa29c7acd7bad15ac86203535e8ca
SHA10c6bd3bf5cadf4c69def08a0e768a4f6f9e227e3
SHA256eeb808a618036d46079004f36fa53df8a75cdd6b8eaae51c9229df8ad0de9dae
SHA51233bfd8360c10c0690e93cfa8afe07220460f16318cdf0c45f09482bb3f9bddfe7b561c118969fe26f12fbbe127afb95730076bb9f88cdceb69fe0cbf8a7d7658
-
Filesize
8.4MB
MD5eff47cfab15e9ac668f2be57ab98979f
SHA1af5f2af097b347b4e117459f0afb376e73eb75dd
SHA2568319c68438ee46145b593f82c99c9c0c33e4b23fa93e6aaf76510222e87e0fe0
SHA5121dea787c785a86b51d2bbbc95d41653d60df2bf011371f55b7f221a5c22499831d5f721d816de3a121efde8050f8674f66aa351f2497b89b17655538b544fcb0
-
Filesize
6.3MB
MD5395080fc24192294e653417dc5248b61
SHA14476b88eeb8c9bfd880e021fb8fd54ceae118db5
SHA2562494c5d5e9876a934856f305df466bb0ba23ae53c1fac2b2f3fbf3981036d92b
SHA512292b9b19138a4bb0f986009cb166df4db07e034ff4dbb03f77be63ae273f48a93445f3fbf2a2bb16f92b328a89707c631f897e09a62d5f08a0f9825bfca75228
-
Filesize
3.2MB
MD5d1a27593c82664c07c1a4e6794d7a6f2
SHA15b921b59804dcfb9679fe039804f24d806f91ad4
SHA256020ebbb694042cafa03ec97b0148219f68448a3e5655c872753c467b5725c44a
SHA5125aa36b71dabc8c8ae2b56ad302930f9e775569b8b3a2d66ce43697775aee1eaa62cb94d302a097b829eb08c2a483f8a41671479297c6d1b8247d570c6c1c80c5
-
Filesize
3.3MB
MD510d9c94e654a1d701617ea31830a6a39
SHA11ed9b58f0ad3d34830903428a8a87e07f8993d47
SHA2566fbace1c7377052b9f1510a202a0ccc7e2c8641437bd82a7a80bc7bfe4bd8cd0
SHA512ba4b7d7b8c3c134f7cd86c474f6e62ad38cfd82e1f377dfb2bd1de295935b3514dabe8f85a45198e1d9493ff556285ddd50400beff00d3504528efe5d3183a36
-
Filesize
8.5MB
MD52521b0736eb1a505e6d91f74da75615e
SHA121bc0d7a32c6cc89091ef16f1341bddfc95d0e46
SHA25626a396f3996db0e81fd1cf0e33ad1064a1f849f99b08371333c92b7371862a4f
SHA5126e3a6c1ed7b1a7cf3be51ff9945060b52fe70915e3bdb43cbd2b68a5795c3f4facbac8057caa2ada7838ff2abd714e93caa09e63c214afaf19f82b65ecb6b4cf
-
Filesize
9.5MB
MD5272916280a01b2088f5144e2de692769
SHA1f16ff0ee46131f6ec16b98225cab07b0a00a957e
SHA2562dd4a024dc6e183eea5ef2dd4ea4eebf2dec9dce04f708056121070d972064e1
SHA5129cedadd2e1ce58f14830587e9c7d9f58481d92b46d6e4d16d56ccfcd48d5977871591510fb1f7f918dc28cb0b4d437d7b7756438b0cfbaeb54453b837a18eff1