Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
16/04/2024, 01:59
240416-cehtbsge2w 716/04/2024, 01:58
240416-cd7q3agd9z 116/04/2024, 01:55
240416-cb6e8aef34 1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 01:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/watch?v=xPwa6NR37Ds&list=PLZrdWXzRp180rcZIxztU1Xrmm8e8RjhRl&index=21
Resource
win10v2004-20240412-en
General
-
Target
https://www.youtube.com/watch?v=xPwa6NR37Ds&list=PLZrdWXzRp180rcZIxztU1Xrmm8e8RjhRl&index=21
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\International IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007fb9eacd943f3b4eb183b5d0ffee896000000000020000000000106600000001000020000000b0869f14af394b97877052adf944d980c7cfed0c3510347e39dad36006a49365000000000e800000000200002000000028925e325fde16a766fbffa2a9ed05a853aae803dd4e95a6c3dc0758143b57332000000010b922df2893e86198c5b604ad59316dcad28ee1b43c23d710b6705b2072e9ba4000000087baf21c1527688db3ba1f6925264437b68b5e994731f7b8e5604b84ce75de8204e60ca8b876009ea7a621ecf226807c51420bf2affdd6072a732b1f8c8ac522 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\Total = "157" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.msn.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\Total = "33" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.msn.com\ = "55" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31100833" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e3c039a18fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "33" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31100833" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1090310724" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "157" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1090310724" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\Total = "55" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.msn.com\ = "33" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007fb9eacd943f3b4eb183b5d0ffee8960000000000200000000001066000000010000200000000b2475aabc1be93d3b78d43df164b0f141dad34f5ce0c54e9640d1144a88d287000000000e800000000200002000000084d71f0ccf66f50d84587e7d98fea083447749381733f717a0044887cc65047a200000005c63a8f33663c1595f05080926086869a337cc61e85c6c8a97d59e381ced970f40000000619d720fad6fee029a67b57c16fbeb2b66464c7443386fcde4856099cf5ecd5c7ee51d3287f6bc2444f8a5cff8e0a0744282fa897b21d1bc2eac3709062be930 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31100833" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6C7AD836-FB94-11EE-888B-D2EF31A6F606} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419997515" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpCache = e9fd0000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Main\News Feed First Run Experience = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108b1c40a18fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31100833" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1252723095" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "55" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1106093622" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\International\CNum_CpCache = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Software\Microsoft\Internet Explorer\DOMStorage\msn.com IEXPLORE.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133577062176703955" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1492 iexplore.exe 1492 iexplore.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1492 iexplore.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1492 iexplore.exe 1492 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2956 1492 iexplore.exe 83 PID 1492 wrote to memory of 2956 1492 iexplore.exe 83 PID 1492 wrote to memory of 2956 1492 iexplore.exe 83 PID 1492 wrote to memory of 4988 1492 iexplore.exe 90 PID 1492 wrote to memory of 4988 1492 iexplore.exe 90 PID 1492 wrote to memory of 4988 1492 iexplore.exe 90 PID 2804 wrote to memory of 4004 2804 chrome.exe 98 PID 2804 wrote to memory of 4004 2804 chrome.exe 98 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3948 2804 chrome.exe 100 PID 2804 wrote to memory of 3480 2804 chrome.exe 102 PID 2804 wrote to memory of 3480 2804 chrome.exe 102 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103 PID 2804 wrote to memory of 4320 2804 chrome.exe 103
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/watch?v=xPwa6NR37Ds&list=PLZrdWXzRp180rcZIxztU1Xrmm8e8RjhRl&index=211⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe83e3ab58,0x7ffe83e3ab68,0x7ffe83e3ab782⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:22⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2780 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:12⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2788 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4208 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4180 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4332 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4352 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4800 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4908 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5064 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2788 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1944,i,1509072184886895793,14372379092914479735,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5f5bc40498b73af1cc23f51ea60130601
SHA144de2c184cf4e0a2b9106756fc860df9ed584666
SHA256c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb
SHA5129c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112
-
Filesize
168B
MD5009d9483c03555320bd2b5c96f969477
SHA1ab5586a5b391c4b40fed5605fe147b335a677ba2
SHA25652eeca699085d45f92e7495c9e2b0f99f2ccf5fa737167bb4956763f92799e3a
SHA512785e99741e8db28a0ab4d485bf1c118c079ed712ee2b5098dab0ac3d86c4b0e776e456991f4cfe28092a09631279f9991a06cb6e6d944b6f4b1a4010cead9446
-
Filesize
168B
MD5acf5b880397a9b79825c6027ded4aaad
SHA11cb0ffd22eabc82926c43015c785e2ecc1210868
SHA25656b62c771c9b6388537c6b0f0e4d5289f7a7a6ba382ee37102dd4ef2154eb846
SHA51248e62e5ae72da6862b01e77c87010ef64825e618adc36d9788e90fa5a43d454337f98a356913c238f16203f7514e2707acced0aa72e96ba87602e9ac924dfbfe
-
Filesize
2KB
MD529edef9dc6d88ff798a6887d73588cc5
SHA1f647e34517ad506561e9b17f740a8d816d0365e5
SHA256e702d6bde6c0aca6c65ef42217c54b6a043ec1b4e8ce1a84ddd96d5dfea7458d
SHA512b74361e7a81178509d195c7202dd9e5456f7f3f11e3834f93af5960d41093ee17df809f065e1690c7ade293d9717f930733f3184b2eca2242c75323388e72f9e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD53cfa8b29cc0c5b87ab458f6fc17353f3
SHA1e41643faad1dcb4d264586bbe6e989f6a036c3f5
SHA256da1a530602d4eca5dde29651ce64ab676132f18facc13b9c1d4fe9110d6cad23
SHA5129e27df8287f3d6ae9f6d2f8297ea7d23d587352c6a503da252893d1747c2b46c669afd87d8b1c183ea17ecfac4911ba28050dae96c4ef8df9f9ffd1ce20f5356
-
Filesize
356B
MD5aa851724d521f7741d74efe0efdda3c0
SHA15ffd9743c87074adb32414f9dfe2eaed2b7a40a3
SHA2567ef41a57e693e68b3b52d425de12a6704273cc781ca2ac79e3e9ec96da34fe79
SHA51262469e6b3a84ca9bdc9f36519b5ad07796daeb4b5d6492a69edfeff286edc7c164b32880905995d9b89dc2c6b741d5964f38a41f455f7af8fbf987913e810e07
-
Filesize
7KB
MD52930e5b356f00854bef921259bbdbd1a
SHA14b7b13c127aec9203d05b101de9e8f6d9f03e2b2
SHA256f1ff0af8e150a6a34e3e7429a7f52ec9446b6a76b6ed95baceb903ca0a88cce8
SHA512aa8839174fe9a0f2be243df5e975ebdef3d2818e7621e54f49e2e34da0c4d73ec84c1aeab1de8adbe4222b1a591be7f0a9ffecdacb9fd34e2e9ccd72f2151e71
-
Filesize
6KB
MD5d41deac58c18891eb66acb2f5c619b7c
SHA11e837984162b1146b885eb288b38e9c0a6f8cbd8
SHA25606e84c9543cbd4047bda7ebbefb3da3148ba0b3acbfaf529c4d82c0aa5e3f1d7
SHA512e81db89229f19da1f9cc6694b08a69803502e785789e686dfd14be51fbc9abce90dafc666fcd84c98c71472b77e13df4c44d73b480bd4dff657f45e06cb7db8a
-
Filesize
7KB
MD5a27a7cb34937f24a4e3d4e5b3eb1245a
SHA1b6b7b28da8b8fff0756107e9e7b36b226c0fa5a6
SHA25642e79ab52a3bd07313507c67bcd605c8da98a185340205f881379692d2e89b05
SHA5129b3912d49982f2203873e48dfd95499fbbc15b3cd7c9630e157b2777d4325cf5a154e8d5b52f36c62feefbda478e7672642b842f79015af5ba2e83635cb4df1e
-
Filesize
7KB
MD52b95f4dc96c4f8f4ec7bb545731043b3
SHA19187195a88e3b261d4c3cd04532ab57d57f905a3
SHA2564cad3225df48180ea4dbc8297e2c65f9bd221a6fa4a73b49a3da1973f32c44d7
SHA512e12a2e179206de996f0a4d4c8cc5bfcd9543f87445b453c91ce9cf79440e06d8ddea6ef0e2bbf4799e9bd9d4d1cd486d650497c175773a810bbe25978188e842
-
Filesize
7KB
MD51d5a414da63f0f387b6b42700471aef7
SHA1d7cbdd2cad456bded76adcc967ec3fe67a4f5f04
SHA2563fd115196db285a2494da8586a99b4fbce40a5febf2c59b83af8563962cb0918
SHA51247682eeef97e14febc7bae90a709dd82c08ab4624c765a2b324b13ab3c9b44eba6578a12ca6e03d8ed3a7652b8d033bee28a9c2ec7cb6faa5d9af91c1a9dca28
-
Filesize
16KB
MD5f4ed971a445f7065e7a71fd4e899ba3c
SHA18d8c38adc1fd6f57406e73e2fd6b5353a4c77c20
SHA256f2a758b5d13cac08d09badf9e9860c962c2740c1672e0941396423fa7f5392c9
SHA5124ebb0054b57aee559ac417bb94aeae1e3e677471b13e4d0814851aaa17d1fe1b36f4e4e85adf129e189aca7a4976b2a2572dedd84098ad84962a446cc7328fbe
-
Filesize
251KB
MD5603b82a99bd3197dac98528428ab2839
SHA104a39523bece7c02ceb43dcbf11c3f414cb83974
SHA256f7fd2dec463564e0079d9f9c5ef259bd1d600e53426315d788117942f7038c86
SHA51217baea6e5b474835fc8c5f0b785671c558d7c3e5d56bc97734320f59369deb67f51087fd617ec380837323b680c627b916dc9785ed1b22a39e12278b23c74de1
-
Filesize
250KB
MD56a58d1e96061257627fcde7382da711b
SHA1e1426c10fbb047bf8bda6bdb9279ad5dc1ed2fce
SHA2566a0e8cd31de87ee0b51113fdc53ae527423a875ba7ceb9d89dffd67fc9be1915
SHA5125984ff8b6b206dec2685e01c344e245f8eb6847abb918f3a68d857024715798c43b41478f2dc087dd127707efe979a2296d82cacfce599f0058f85b6225bade5
-
Filesize
127B
MD5925c23823321a35f62788e2474ece3fc
SHA11a4d7fedaeadbe8e6c085521a7b6b9b2189bca72
SHA256b63e0370c3c786774a79afcad1fcdb4f1293ddbc1cb63f82b4ea57684c12aef0
SHA51255a2393d721b8ef7480e71b031a3435860bdd9ef6d507a30fb83b314ca371884f6c943572737f6a3f311fdd04e0344f11a42be56cf5fca47da03a8245683ddf4
-
Filesize
2KB
MD590f6a1aba3b604e4094de4b49b868953
SHA1d6b7fee80cb291198a93bcfdec1dbe19e1fbd18a
SHA256cb2f4279e237f49f0edb2616208f89d71c10d006cd97ebbfb0181ada235a9b5d
SHA51232778bd18c750a8220c311643854ad154d93f87bb9f7b4cd95f926dd441d1aee0bcbb5cd976c228a921a6a691853f1a35eefe391d493ad0c5a85e1c53fb6cea7
-
Filesize
1KB
MD50f1a8182714168610d80e7b7ff384b39
SHA1a25619d038618fffcd682740350d25fc0d4dcaa5
SHA256f5beaf18ebc16369bc675dd592fe04faa4c3c21c92cc27e161f61b4d18572551
SHA512224749417aa456d44ba8aac6c9ec36b625c6843216f9bb180a00886c243abed235299c7883f03ed247a0b14b2f81eec3d5500e7c54c7794dc55ec364e8899a6c
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
758B
MD584cc977d0eb148166481b01d8418e375
SHA100e2461bcd67d7ba511db230415000aefbd30d2d
SHA256bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c
SHA512f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3
-
Filesize
1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
16KB
MD54c2651be77a1e93965e14ac54f8ad8a9
SHA104cb0463536352d51aca6ae5ac6eeed95742828c
SHA256ce076628ba2d0bb6f79cfadb367eacc3cb9bfe71b15e57347839d37be86dfc52
SHA512659101201a4b44082b6bdbc44804bbf7c17e0373987eb8973af4f4c3bf2ca4618e5874a5e9a9b358bce9153a04dd5beea8a11e23f5f366a653018d1edf68db1b