Analysis
-
max time kernel
88s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe
Resource
win7-20240221-en
General
-
Target
3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe
-
Size
4.4MB
-
MD5
07a95b7e6cf8d701311c5c03de734891
-
SHA1
c08d5097589fefbf7f6ee6adf7175937def481d6
-
SHA256
3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27
-
SHA512
4cc930e805dba6865e38ae336ba6ab38fdcf122537d8a4936947581982024bd239265ad728398ae0cef3e6d4936e9ceb21fd9b26d3cc2eba6286cb53822a1df0
-
SSDEEP
49152:h7Gw6B1nqR4S2Vc2k42DCbLnr0ieR02Z/K0tCJaMIPh6vRPPZAKCoZOBz0Xk/VTX:wESXTeDZ/K0tQPZvCoZm7qiiW/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2908 Logo1_.exe 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 2544 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe -
Loads dropped DLL 2 IoCs
pid Process 2668 cmd.exe 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe File created C:\Windows\Logo1_.exe 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2908 Logo1_.exe 2908 Logo1_.exe 2908 Logo1_.exe 2908 Logo1_.exe 2908 Logo1_.exe 2908 Logo1_.exe 2624 chrome.exe 2624 chrome.exe 2908 Logo1_.exe 2908 Logo1_.exe 2908 Logo1_.exe 2908 Logo1_.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2668 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 28 PID 1728 wrote to memory of 2668 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 28 PID 1728 wrote to memory of 2668 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 28 PID 1728 wrote to memory of 2668 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 28 PID 1728 wrote to memory of 2908 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 29 PID 1728 wrote to memory of 2908 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 29 PID 1728 wrote to memory of 2908 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 29 PID 1728 wrote to memory of 2908 1728 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 29 PID 2668 wrote to memory of 2612 2668 cmd.exe 32 PID 2668 wrote to memory of 2612 2668 cmd.exe 32 PID 2668 wrote to memory of 2612 2668 cmd.exe 32 PID 2668 wrote to memory of 2612 2668 cmd.exe 32 PID 2908 wrote to memory of 2580 2908 Logo1_.exe 31 PID 2908 wrote to memory of 2580 2908 Logo1_.exe 31 PID 2908 wrote to memory of 2580 2908 Logo1_.exe 31 PID 2908 wrote to memory of 2580 2908 Logo1_.exe 31 PID 2580 wrote to memory of 3040 2580 net.exe 34 PID 2580 wrote to memory of 3040 2580 net.exe 34 PID 2580 wrote to memory of 3040 2580 net.exe 34 PID 2580 wrote to memory of 3040 2580 net.exe 34 PID 2612 wrote to memory of 2544 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 35 PID 2612 wrote to memory of 2544 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 35 PID 2612 wrote to memory of 2544 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 35 PID 2612 wrote to memory of 2624 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 36 PID 2612 wrote to memory of 2624 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 36 PID 2612 wrote to memory of 2624 2612 3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe 36 PID 2624 wrote to memory of 2432 2624 chrome.exe 37 PID 2624 wrote to memory of 2432 2624 chrome.exe 37 PID 2624 wrote to memory of 2432 2624 chrome.exe 37 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39 PID 2624 wrote to memory of 2752 2624 chrome.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe"C:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2368.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe"C:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exeC:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=104.0.5112.81 --initial-client-data=0x15c,0x160,0x164,0x130,0x168,0x1400b46c8,0x1400b46d8,0x1400b46e85⤵
- Executes dropped EXE
PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bb9758,0x7fef6bb9768,0x7fef6bb97786⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:26⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1608 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1664 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2156 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:16⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2176 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:16⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1292 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:26⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2824 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3336 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:16⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings6⤵PID:2360
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fca7688,0x13fca7698,0x13fca76a87⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=07⤵PID:2192
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fca7688,0x13fca7698,0x13fca76a88⤵PID:1740
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3700 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3860 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3092 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3864 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4072 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3888 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:86⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3804 --field-trial-handle=1280,i,5831981949363978984,16639312642346276033,131072 /prefetch:16⤵PID:2488
-
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3040
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD56857cf81210ed5170930e5bda86d6bd8
SHA1ede7b5e8d0f1efdb00c6b92b236c17691711ee00
SHA256b37d268c2acb836286ec3f52b67679701a4900d807dbac3fe9981f89a8d6e7c3
SHA5122f15d5a55dece454405db3403d305b5b8f91e6465afb9852a1ff6709ab3009c4b8ded694973643e6bb126a9018d0dd8a65ba7cc1ab0fbd05650637c0cd992b3b
-
Filesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
Filesize
40B
MD589f4922a7587a9f92f626d7868051285
SHA19419dc4f12c1cafefe5a1a12997cd4c0ae5d6702
SHA25616d4c209625f423200c0a930685ec659bdc58c7e5c7848d0008979311b945ce7
SHA512009d7b6d168824bb8c8c15f256502673af694fec8b7fd3761567bddcb0c40500d77de42c13313fa33e7848d8380d097cdc4c14dd21e71023572de5508127f9cb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
4KB
MD5347511095eaa234a591121d546fd7d16
SHA19ae7517e486c05c234d6667fb41ff1fd63c5afd9
SHA25644f530c1bf6e05f889d17592a3f4431be5ad7b70c7989b224d1756849f2488a2
SHA512a716659ed42b26475f45657466c98a8e5ab31ed89425f7507f97017ab5b8db9c103c5251e98857659f1397097210ae868a6e6af10d1d29c147e8d9bb4659b539
-
Filesize
4KB
MD518ee1712365b7acd93d07be9411dc13e
SHA197d523dcb8134c5dc7f83fb0105b4c69c85ac05f
SHA256ee1ca051f43b57f2b0fc346f287df9b0db0ccd23117e4ca25a561523250b4ea7
SHA512b830661f4a2aa612d9eb2551de916763ab1f38ec88173d35849df75c2f3a52cd0ff29c4081650193939220fda203f7595513d5d18d33d113f08d3721998034fc
-
Filesize
722B
MD517667becf81ecbd0d140342d701a0a6c
SHA1c1bf779b92d4527835a656ee83fa67d9fe8860fb
SHA256c92bbb850be1f89fef13f6a04501753ac4e1b119262d5dd2747a56369bcac06d
SHA5121f15a95dcb6475d67a720242cd83371fac2df191191575e92ae24672f33cf1cba180151ed250e527738df60a06e480078689c071065e7daf69273dbf1ef3aee2
-
C:\Users\Admin\AppData\Local\Temp\3404b07a501ed92b0c3f0c9bcff52207b88665729e2623be73b62c08d9eefa27.exe.exe
Filesize4.3MB
MD501b5f624498a90c3f5ab35c6172b3946
SHA18503d15e7a62a080ce18785bd7b78dc7d0af1e4a
SHA256620879c1168a6760677990ef6536b6aea15ebeb0f370522c81c5117b311c798b
SHA512a384ddece111df65a104d0969d46287de3b677f34aaf5adffb336373ba1d462d0516de0c83d6c86162d861e1f8a53d4c5af0761aaa82aa2bd54ec02d3f043764
-
Filesize
8KB
MD53cc51678e36920dd09888512e98083f7
SHA1afc422570f79e2f7cdea7b601a7919e337e6aa18
SHA256ca50df1d43520327f8c242e94ec7a4fe1d2fd597bd1485849501be502a7d0b26
SHA512806f1744bde0498c875a4b5ae4b954bc0a7e7a84a849501f3436d18580767374f80532621c01f3edc79a8c7558672264e9038edffa07028060caee13d36655bc
-
Filesize
9KB
MD5cfdd6d16a720c8435d9973efd28fab6a
SHA18d50bb08248674d469e00d94f0dcf56868cad7a6
SHA256c35e9809c15aa94e6a8375cf87abe6a8c030cd807c1c774a3918f282d79bb4fa
SHA51211ef2284f04f8521e48398e4980db1143d29c7b561e2a086358cbbb9af5439c82ddaaa31d11bac678bd3362306641b07b19a86f73ccbf9111ad1ca272c0cb70c
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2624_1612718530\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2624_1612718530\c2a5152d-b314-4d4a-99d9-4b05ab940e3e.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
26KB
MD58798ef6c65ae81379131a4b496ca5f7e
SHA1872c6836ef2bc03c931cd6eb09d88253b7595f66
SHA2563bb3b43db951b65389a3026ee287f6b5eab1fade33c6035b83d9e8be80a92dac
SHA5127f11f550a995d623555f3b75a506137f44b340caceff986b57e306f10587a1361d80532ee673695e84085685cebb7ed2fe05598f03b1c970e40d053dd53e0521
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a