Resubmissions
22/04/2024, 13:22
240422-qmp49scb3z 322/04/2024, 13:20
240422-qk3mkscb2t 322/01/2024, 15:42
240122-s5pybsacbm 316/01/2024, 17:21
240116-vw6ktsfebr 3Analysis
-
max time kernel
51s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-es -
resource tags
arch:x64arch:x86image:win10v2004-20240412-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22/04/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
documento9030.exe
Resource
win10v2004-20240412-es
General
-
Target
documento9030.exe
-
Size
6.5MB
-
MD5
5098ffb7635e3b87c1476aea7d24a5bf
-
SHA1
50fa4755fd48e1b22a718b6a90b46dbead28fcbd
-
SHA256
55b0247b9b574978a4c9abd19c3bcc04ea78598398b9f8aeb35bd51cbd877576
-
SHA512
95822f54872cee4b78b3956315bab722e8623a36c3627d9a32a614aeb4b5be2adcf2a88592dc2d05f2fe97c8e9c234062983a6a396bb72a034d0ad0dbc24f40b
-
SSDEEP
98304:imMbDvtv04eVg5Vy7DzGMoSICiEdefg5SVdO1rjFnW:iJb7df5Q3zr3IREwfa4itn
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582656672514604" chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1468 AcroRd32.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 4932 1468 AcroRd32.exe 90 PID 1468 wrote to memory of 4932 1468 AcroRd32.exe 90 PID 1468 wrote to memory of 4932 1468 AcroRd32.exe 90 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 5056 4932 RdrCEF.exe 91 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92 PID 4932 wrote to memory of 4744 4932 RdrCEF.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\documento9030.exe"C:\Users\Admin\AppData\Local\Temp\documento9030.exe"1⤵PID:5048
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\XML-A873ACA2-23AB-FAF0-2475-B316368685F7.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C172ABCB56BB58D8BA297B79747556BB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C172ABCB56BB58D8BA297B79747556BB --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:5056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4E53B3B77719B4C2364486ECA61C69AC --mojo-platform-channel-handle=1860 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4744
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7AA3509248660BF0B5352FC8C5125F6A --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3400
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=543A6EC1EFC4746BA5D0BD3BEAC550EA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=543A6EC1EFC4746BA5D0BD3BEAC550EA --renderer-client-id=5 --mojo-platform-channel-handle=2036 --allow-no-sandbox-job /prefetch:13⤵PID:4824
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=527DF0D9FAD59E5082413A39EB70509B --mojo-platform-channel-handle=2680 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=49EA1DB23402284441DE7D473C07E15B --mojo-platform-channel-handle=1864 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3036
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaf94ab58,0x7ffbaf94ab68,0x7ffbaf94ab782⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:22⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:12⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4504 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4652 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5000 --field-trial-handle=1916,i,10419785772709015448,10959604053721098728,131072 /prefetch:82⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54ddd27bd64c33b38c147b292be382781
SHA1697f30740f92b0bf96bc8a819412c8ea51f4814a
SHA25682a99e529c56604261c1b587a5d7ca49276daf1359fa4ec1a7bd8e50d1386a51
SHA512641a5fb54a5805d1f1f36c49b683a11996c06f807a02790d68a1c4bd7cb6c2525c9ee3264966699946cabb432bede9ed12f4fc54b5c521c908dc15d39067d475
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\99e105dd-f363-4612-a4bc-300931870d45.tmp
Filesize16KB
MD5e3bb619e2752117382c656d653bb21c6
SHA1351cc609e2b2185d2559e10a066967de8bac138f
SHA256a5e00b52ec899d19ee20fbd45f3d2f66b97947311ad43c71a3bc3ecca055c8d3
SHA51230df16db91fba17f5f8b3e331e5554f295fce245a5c0cce01d640c3cdf68b23d76010f7b0021d4d12eb22110ac3bf635dc944b2c47da20d6c9f270b0e8e1a647
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5628d2c5d90c43352190c4ffa3c7480ca
SHA1cf654f5b0d31267eb5aa64dfe62f212c6cc3c764
SHA2569f8fd737fc21c502c62a7177ecae6234cb3b6cc7b385168183d0e645914ce306
SHA512a1cfaf40af616fb1c267ddfce9259df61905fa744972c7e68918087ba7614e9340fd259740435e47b59942a5b8fce5ada60250b7c5eb0c8bf4e1b7f9fa5bab4a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5e9201e826791e8747c3e7c7d20173992
SHA177da2261442e9407d198f915595c07c447e6db4a
SHA2560b0e71e19e1957ab9d33a0d5568b4ed4dbd1178f659403942e1476b2ee4fe325
SHA5126d2bde3a182334531e79369fb3db9381777b08249f087f32dee15b56066079f6c6700fa5d0a82844be13b9518c69492ca2d6fb9789a7f1c098bcedd278512bf6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\c88f617d-578f-4b18-8984-2e82c3846bb3.tmp
Filesize6KB
MD581ff883c2fd1a097ab1a35ceec9ca3a6
SHA1e60fa66b99f07584825c8c03a84530e7a7b4b5fa
SHA256600314d9d7d7440bda66b4a0c1c4abb894c8d2005bf24c77bf606e2c08ba54e5
SHA51225f2b1639279ab4b3aaed6810affeb2afeb455538fd3d1331fe34a7413089cc022f31d8c773f33cad94d446d1b93828ce7e69afe9cc2a60ef361e133fffa2b80
-
Filesize
254KB
MD5daf6f97a850f8559f2012ffe31485cc3
SHA1710fe637430bca59bb463050cf8c64c9d9f0566b
SHA256b354a2a663443fa2444e462d8e8d72df13419933412f48edaa5f7fba242385ba
SHA5123316c37990f82c67bf4c75f8f63ddcf93cb0548957bbf41633ee230e7c05458389e068b1ead96ab33151c794cbd172761226404c058da58d16d589073c0e5df3
-
Filesize
252KB
MD5716f09e8f40d4d347a1b0eb0d879f06b
SHA1909e5fad4f54353f72120f2031c5334c76a40857
SHA2562908ae6075a5c40ebd652c434254238b3048d976bf92c995195088a3fd001f07
SHA512a125cf4ccaa741d0e44b1353241654c4b8259f9024397d5668beb1e22c5df573768721305970352f0a56f398223ecf8683ce0ac288b70a33ec9602cc4e06e2f7
-
Filesize
1KB
MD55b089307903575d80a45adb20bc6f78b
SHA17ac2ea6f87d04be9583e988264da82a9f148734a
SHA256bf9129d97b7149f43ff05b6c9b5883fe8a17f8b52a99d025b88b57bc2354ec3a
SHA512dd5cc2034668987609de5b2686bb0e5311a62f1597619d516ad175d641f1636bd0995dcf300d309cd456b4d3571d5f61c1f4f3299031040bf57df151436f47cf