Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 16:38
240417-t5dqqsha6t 817/04/2024, 16:29
240417-tzjd2afd56 717/04/2024, 16:16
240417-tqy35afb29 817/04/2024, 16:13
240417-tn61ysge3w 817/04/2024, 16:11
240417-tndpeagd9v 317/04/2024, 16:01
240417-tge9nagc4x 817/04/2024, 15:53
240417-tbt6maga9s 3Analysis
-
max time kernel
249s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
settings.json
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
settings.json
Resource
win10v2004-20240412-en
Errors
General
-
Target
settings.json
-
Size
717B
-
MD5
9524b55958a0e976a0b97cda97c12516
-
SHA1
c27592c0c683be473ccc0f1299a1a464f9f4792b
-
SHA256
092129f26834f0f3453c3c0cf6fc450c8d9c00e8521a464affb3b5696ae7263c
-
SHA512
cf122e2a291baa58a753bccc0f7cc0d93ab35f62bd39ffce5cba29e9455f904727d7496f70154254c154481adcd25f59137d993b81c0f8d7c2642a6624ec5407
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "20" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578428562225497" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 988 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe Token: SeShutdownPrivilege 1424 chrome.exe Token: SeCreatePagefilePrivilege 1424 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe 1424 chrome.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 3872 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 988 OpenWith.exe 4140 AcroRd32.exe 4140 AcroRd32.exe 4140 AcroRd32.exe 4140 AcroRd32.exe 1664 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 5100 1424 chrome.exe 103 PID 1424 wrote to memory of 5100 1424 chrome.exe 103 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 5008 1424 chrome.exe 104 PID 1424 wrote to memory of 3464 1424 chrome.exe 105 PID 1424 wrote to memory of 3464 1424 chrome.exe 105 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106 PID 1424 wrote to memory of 2724 1424 chrome.exe 106
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\settings.json1⤵
- Modifies registry class
PID:1820
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdd2bcab58,0x7ffdd2bcab68,0x7ffdd2bcab782⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:22⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1928 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3140 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4444 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4556 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4680 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4600 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:82⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4820 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:12⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3420 --field-trial-handle=2256,i,6634971960377105838,8027772371708682579,131072 /prefetch:12⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1720
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Windows\System32\adhapi.dll"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4140 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵PID:1088
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7581977B6F64DABE6F83FE55CEF783E4 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3320
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FF5C9A9AE95E417C380149FD3EDA5E10 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FF5C9A9AE95E417C380149FD3EDA5E10 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:14⤵PID:5624
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F4A005FBA4AA934E205514C2BB750FC6 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4992
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5F2993B245EE60BD1A6677467A6862AE --mojo-platform-channel-handle=1896 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:5648
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=98C7EAFD45A01CC75F1DF6427214A02A --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4092
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1100
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3967055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD58b4ef6b5d7ac5e05490ef8f2a529a58b
SHA10aa1cce44c0d3b75f43e324613dd989f51caa0de
SHA25621ca6b690b3940218cded851e828a8714cc831bb0828e2208ef3d5f33683660f
SHA512351eb5f351ad08dd877c94d5996e540899a8034e6fb7cd4414d9977bb577c7f3a05f7529f35f2e93025042fb48e88706fd74ac91f46bda38ece446a50df24b94
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD5d248d270f075fba23ec1cbb0abbb0d70
SHA1f4370ba79f934052783c0056304b735fa3ff4812
SHA256d60d711948674f9f3e75faea05f9450a8fe5fce1060e06e81304651341e1727c
SHA512b815e7a198b8ecc769ac51c3c2db0fb1075e1e816e572aff61345a44c0eccc58bbe59912ed6dfbddb695d09623830c7fe3ee22d35e6e3cdcb7a16773959e97c0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD52abca3eb1c4978ba3ae1a0a0394d9fac
SHA1f5e8ffa793e39e85657d5100bcd0e40f0bea652f
SHA256e80df200a74643aa02ea1bba96198ff14c74c6ef6edb596050b3b23929002e36
SHA512f6ca165154a9395f8f8ae0169d483408464270981ca9b946ddb3791de4a8a92d4714003ab9c1fdaa82ce41956130495a0cd977bc26b4cf38150aedfac70d2985
-
Filesize
356B
MD58dcc0b127d054739f17b2ce8541e6262
SHA1a8306a8ee4638064c4901603a7ec37ee0ae1388e
SHA2564457b1459382e789e1177137aadd3556014c715a3e246e7a1d13d945564b70ce
SHA512097ff02a18c283213c12332eaacb339e616e0cd800275e88885eeb93d91f50bd40a65c4265b6af72af7b15fd7974b1a892958ea05af8526320f3047e48c042ed
-
Filesize
7KB
MD564717358e5692c895abb5b19b6b09cbb
SHA1b9b2268f01368fa445f2c816a15c47b2f9138482
SHA256669be985df301e30e2d5de7ef537309da804a86172fbe6fead9fb705773758bc
SHA5123a0e800281777a4406b295675b13d32f00c64e04a7a2121f78ae58c3883a89564beac9712c10d4e6971aa6f76c60547b732db152ef086adde0f95752ce458b7b
-
Filesize
7KB
MD57c453aeb10fa25931354db5e3ea2d629
SHA1abde103cc92fa23ef9fa5458195afecbdd2e6585
SHA256e52c6cbf530c7d55ca6efab5fe51c20d209d33f95c2d4392b3c486e1072deb57
SHA512d46dd3d206d5dbed5da17141a78d0e37568e0e0a3022ff820f135401a3d89e535634cbb36c9e5a9613a31d45a4365963f01ba1a3a35532f0cd74551c7b83d7b8
-
Filesize
6KB
MD5cd7a3b0f3e2e376d4c15a01b8bc193c9
SHA1e08a4c2ea89e5c8bb6d70011260b1772713ecbf9
SHA256bb2e33a0b4c24f7a597a3befdf3439994f771a16f0aa0984fb288995b4ee6aab
SHA512d0d819eead649e19ec85c9c1e3ebcd37fc5fef7c7d9b10d832bb03d719a073f308ac6d8144a8bbaaddee4b310c6790dc14262c7f8a7fa07ed23f199313f63c13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58c196.TMP
Filesize120B
MD5fe46504d433ceac3aba5b1f64561494c
SHA1151de4d747b74822f56e0210ea3d5d8b48d74843
SHA256287d8a9eaa1bee9867a3fdbb9f52c0c06bfaa76849fe766f5b79393af5445fdb
SHA512196b02a3e57af83bcc280c6c45aba5a7ff03f5ef929fa475c985076b8688edbadefae9e3229ffeb980d732ac6d9f15adad199b21256d83c3208265c6e60714bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e36a684a-db0a-47d3-8429-d9bc87604a27.tmp
Filesize16KB
MD57dc6fa41f47b0bb26611010cfd5db316
SHA135af44084847d9959f61de5f335a763ac08c6354
SHA256508878c65a118d355fa4db5658b16c08e836f6848a0f1048a9c986f57db0a68a
SHA512cae9a6a676a268511e44961aefdfb9380b07cc44e069855edffef1a1d525e71e1be1ef8b5fe9a87ef35f53ca487035d3ded3d9c0dd34f54d7881de06261be964
-
Filesize
251KB
MD5d4291b28e7300ed84c8004e1bb761cba
SHA1286c16c91789d5833e504f0f07bd121b0f7a8e9f
SHA256d25fed4fc4cb78073c1b03e2bac3c2e633299edcac54defe4b709835c217a92b
SHA5126998e9e9d8330ee3fa64efa86b7f879d713c2bd88855b6c7436a8eb6900c540568df0eb54ad62cd28a64b1d999e3f5aadea23541eb809a8ce9c4533c6d521661
-
Filesize
251KB
MD5022bb09b8a485f86a740238ca567b752
SHA19c40aa4f6b5e0e0150b4ce8c6ae72299ddbc1702
SHA25657c06246cb16443a2c122e1cdf4114b543450bfb825b42da4f9d10a96e432378
SHA512a8bb465a5badb79681ef8614543d7401320e72ecb48a904ede8a8e50c10543b905873969fe3ec1c0e76ae192ff724e58e5a64b82a9b00f3e521172a9f056bc53