Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3SophiApp.zip
windows11-21h2-x64
6SophiApp/B...sm.dll
windows11-21h2-x64
6SophiApp/B...er.dll
windows11-21h2-x64
1SophiApp/B...on.dll
windows11-21h2-x64
1SophiApp/B...on.dll
windows11-21h2-x64
1SophiApp/B...ws.dll
windows11-21h2-x64
1SophiApp/SophiApp.exe
windows11-21h2-x64
1SophiApp/S...config
windows11-21h2-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
SophiApp.zip
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
SophiApp/Bin/Microsoft.Dism.dll
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
SophiApp/Bin/Microsoft.Win32.TaskScheduler.dll
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
SophiApp/Bin/Newtonsoft.Json.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
SophiApp/Bin/System.Management.Automation.dll
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
SophiApp/Bin/Windows.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
SophiApp/SophiApp.exe
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
SophiApp/SophiApp.exe.config
Resource
win11-20240412-en
General
-
Target
SophiApp.zip
-
Size
3.3MB
-
MD5
499e6e4c950002919508027066fc2615
-
SHA1
6d49f4f793c87ed1498e4a23888d025118109a18
-
SHA256
621226b572dcaa91d44e36450f82fcf28fce052dff5770d50b3f628987f59291
-
SHA512
700ddedb488335abe4bb834d5046c4de6f95e344be361c5ece868598e0178b0e11b3e461c2979f219eb7bb978fe9487e1bb95317f9d9c3590a52f9f2c6b24a67
-
SSDEEP
98304:yVWwc1nmWVIazWWgRsjBGsGuAZ6FzmpU2:yo515RWxoELZW2
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 57 camo.githubusercontent.com 58 camo.githubusercontent.com 1 raw.githubusercontent.com 52 camo.githubusercontent.com 53 camo.githubusercontent.com 54 camo.githubusercontent.com 55 camo.githubusercontent.com 56 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578411741582720" chrome.exe -
Modifies registry class 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\MuiCache SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\MuiCache SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\MuiCache SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\MuiCache SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\MuiCache SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe Token: SeShutdownPrivilege 2528 chrome.exe Token: SeCreatePagefilePrivilege 2528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 8 SearchHost.exe 2972 SearchHost.exe 5008 SearchHost.exe 1316 SearchHost.exe 1468 SearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1880 2528 chrome.exe 95 PID 2528 wrote to memory of 1880 2528 chrome.exe 95 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 2344 2528 chrome.exe 99 PID 2528 wrote to memory of 4928 2528 chrome.exe 100 PID 2528 wrote to memory of 4928 2528 chrome.exe 100 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101 PID 2528 wrote to memory of 4916 2528 chrome.exe 101
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SophiApp.zip1⤵PID:3556
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:428
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff93be9ab58,0x7ff93be9ab68,0x7ff93be9ab782⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:22⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2080 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2720 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:12⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2728 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3716 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4316 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4468 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4368 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4696 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5068 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4372 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:764
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5008
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1316
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5556928a5f73751dcdbb15f8911bb111e
SHA1a1574ec88aeadb10291e42806fb34538da3f99bc
SHA256498b89682215bf7ed7af594e370859e6de89ec1c5b386c6ae9ffa76cb75536eb
SHA5129ceae4b97f23469a2f6548a67aa7fa2371e0d86e143bc3ff1207ca7bc49055c6c83e7cec35279547ea8b60a593178dca29d478899ee2224a8055914c4f0db8ea
-
Filesize
2KB
MD5575c37100ff94338467c7698ab37cd44
SHA1ed0085cd343f1a9fc6ef8097d5581058fadc9940
SHA256d1cee572b928f536471330f96a235cb006b7baaf88a3aa541516d5e3c4220348
SHA5126bc6f7d7e564df8b64cb1f3646bbee8ba8826cc1436062186f697d11a3783249e6fea824f7c193f30fd077216424d9941256da840045dd4481c69099fa577133
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d6f95fca4aa5abb8af780fbd670be3a7
SHA1fb7b5f34cb91bd0ed1cab0567f51ccf899649b20
SHA256e480b9a0a4e58baac200083afe36b0751c314924c610d060956a75971f87aa89
SHA512e0c0ba65a8a3a1e79f1f386beed6c5bb242f5798a111b27ac54331478ad8c1c8721c903ba290ee4add746f63d29afe54398a9f91aa8d8ab9202090f38a524a8d
-
Filesize
1KB
MD5f3f5a2a5ee3c9e34b166d8e3fae513a6
SHA17b713933f76b50084ad3b198d94907e6700db09c
SHA256997e39441332889a2f338c08ed17a277d25e5e5ed5907be646f9ff76c2eddfb0
SHA512fb407741edcabb0b5b542f6f23542b8e986da73a8500705a1dd35a839954670a585c3f40fbcff80294bf749a1c53a76413c14da4adc253ced6052833bf0507be
-
Filesize
356B
MD51671cc99fb6c785069a0012d5965f445
SHA1f9121165855a6aec25dceed63c8c837191580f4e
SHA2569fe02eed8bc4db22cea8358696b13f6fa6773a19831a0c1579d85aeeb9cb9a9a
SHA512631cf156cdeb006f57434d2bca1e97a5f26c3d85e97c94b62facd9bd9d4eb5d782b91bf52fcec634dc5f7002e3d34998f6041d431d6c7229aa8dd62aa30b1d3f
-
Filesize
6KB
MD54b0ae8bd00232d15a18aba3fe69334cd
SHA1939cb48b72ffa48edfa6cba1c84ea4d47c167b33
SHA256c77fa639186e191b039526eec2c152bd6a974a798701ea01cc624ccb3b1dfc72
SHA512cbd2fa22619ec509d23fa9d6ceb3d99aa8389bbbf64a406b4ce2f7cfb9df04425f21f7bba7f9b66a4955a08a74fcad398a6a947241ec1c1c8a3c1098c3f84501
-
Filesize
7KB
MD5f8740823c9c7fe4a8b036146815717fd
SHA1720a0b1618a1fb292f480535a0e4ffb82b7452e0
SHA256f90a6a140d7c6c2e514d805928609541a6d5054ae6d21f63f9954a4d7badef30
SHA512ef6a3af79ea9d584ac807cba21f4b38f1c6f70e6ffcc87030160a4e81623a0eb38d207799ff092a66af754e0fd8afd42183d5475614a6dc671454c23a1209096
-
Filesize
16KB
MD5d4cb05cd316d2b1a806f738f85bc851e
SHA18e67c07442ff121744cda5ccd955a72001bbe330
SHA2569b300282cf1d41bb03d6f25249822d6190a9c8911b515c1922e00abcbe2a2b77
SHA512564d4bbedf16cf1fbe058c84209fb6944d1d7e21c8e1dc22702f3a36655bf6dbce73dcd79c7032694ebe4c19c442bfdab2351d7c0bc2990e900eda73ab45a964
-
Filesize
251KB
MD54646ac62681b54037d02cc49164c8fa1
SHA1cb898748ac314a78e1ce9944789088a2020eabf0
SHA2568f99228b3d69bda27460eb0a09a295a81d95495bbea35f8fa9246617707b4bac
SHA51228f830d48e2533100992f092fa55b696735dd0438903dda8085d3cc0f2b7742e4639d742e1d35f9e9569c695daf98373e382b3054f390caa98eeb59765e6d1e7
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\7270B404-F91C-498C-B7A8-BE547AA3F311\Zrtu2hQ08VU_1.bytecode
Filesize62KB
MD5dc9f6a20504cef0cfcd0dd9e0a3f4746
SHA10984becd8d0be854e8a8654bbec5e8a164855d3d
SHA25692b952bd0867c570af340dba400c3c0002809c379154f212a197438d17a2b0e6
SHA512dda3a07c9561e57deb77aef691ac8ac8c9436265323de69228c28e609e323fb927501f9eb48d5b16a1529d0b2d751903df5ce8e710694a83eb80ad2d6825ce5b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\7270B404-F91C-498C-B7A8-BE547AA3F311\Zrtu2hQ08VU_1.metadata
Filesize192B
MD5980789fe21d60f9a3c0450adf692d2e0
SHA1355b1df23bf019f85279245ac1caa159cabc5cda
SHA2563f9f7801d8cc634bad95a35c33163f948e6e3b18fd9d4230021aef769e1b96f5
SHA512c555fc95b4727302181e29dbe0575c4b19d21ab00da2bb31e87cd2dd3edb5bae9060fd1618d8520be6b515a587a6f63f22076db6be8089903259c1635b60fdb7
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\XOSSWS1G\s13bmMn_O0leWsDgDXskAu2MbjY.br[2].js
Filesize20KB
MD59e527b91c2d8b31b0017b76049b5e4e3
SHA186bc98423492c4ceb41277298277edbd217e2d3a
SHA25638edf0f961c1ccb287880b88f12f370775fc65b2e28227eee215e849cdbe9bbc
SHA5124c19a7633ea4042a5c19b0f9e4aedfe0b67eca49f7a30aae8c59d489348712da3a84c03b695e16ed50cfbe5a838d0226bd930ac6847474d6398a7ca1c5f65b98