Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2024, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Google.com
Resource
win10-20240404-en
Errors
General
-
Target
http://Google.com
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1184 ScaryInstaller.exe 2232 CreepScreen.exe 1504 melter.exe -
resource yara_rule behavioral1/files/0x000800000001accd-327.dat upx behavioral1/memory/1184-356-0x0000000000400000-0x0000000001DFD000-memory.dmp upx behavioral1/memory/1184-405-0x0000000000400000-0x0000000001DFD000-memory.dmp upx behavioral1/memory/1184-443-0x0000000000400000-0x0000000001DFD000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 74 raw.githubusercontent.com 75 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\Desktop\Wallpaper = "c:\\bg.bmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 3 IoCs
pid Process 1300 timeout.exe 2248 timeout.exe 2452 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 3 IoCs
pid Process 3736 taskkill.exe 4496 taskkill.exe 3040 taskkill.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583708853792251" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 4480 reg.exe 3068 reg.exe 2732 reg.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2068 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 chrome.exe 224 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 CreepScreen.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 2068 vlc.exe 3724 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 216 224 chrome.exe 74 PID 224 wrote to memory of 216 224 chrome.exe 74 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 4052 224 chrome.exe 76 PID 224 wrote to memory of 940 224 chrome.exe 77 PID 224 wrote to memory of 940 224 chrome.exe 77 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78 PID 224 wrote to memory of 1308 224 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaa09f9758,0x7ffaa09f9768,0x7ffaa09f97782⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:22⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2036 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2668 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2676 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4348 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4908 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=892 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5592 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5468 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5056 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5596 --field-trial-handle=1744,i,8492143038666231876,14825436347538403862,131072 /prefetch:82⤵PID:916
-
-
C:\Users\Admin\Downloads\ScaryInstaller.exe"C:\Users\Admin\Downloads\ScaryInstaller.exe"2⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2C5A.tmp\creep.cmd" "3⤵
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp\CreepScreen.exeCreepScreen.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Windows\SysWOW64\timeout.exetimeout 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp\melter.exemelter.exe4⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 10 /nobreak4⤵
- Delays execution with timeout.exe
PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CreepScreen.exe4⤵
- Kills process with taskkill
PID:3736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im melter.exe4⤵
- Kills process with taskkill
PID:4496
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\2C5A.tmp\scarr.mp4"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f4⤵
- Sets desktop wallpaper using registry
PID:3460
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:3856
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:4480
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:3068
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f4⤵PID:3052
-
-
C:\Windows\SysWOW64\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:2732
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d "1" /f4⤵PID:3572
-
-
C:\Windows\SysWOW64\net.exenet user Admin /fullname:"IT'S TOO LATE!!!"4⤵PID:4764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin /fullname:"IT'S TOO LATE!!!"5⤵PID:5084
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 8 /nobreak4⤵
- Delays execution with timeout.exe
PID:2452
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 5 /c "I CATCH YOU AND EAT YOUR FACE!!!"4⤵PID:4080
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5116
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3781⤵PID:2320
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3af2055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53051372a1fcfbabbcdd8733959d9c7aa
SHA1b37535328bee4b8b39b84c594c9c7eaea200881c
SHA256a8dd8e40fe505f0bb0eea5a355d67591d959ad753e09b2761c5a0c3b4c40e8a6
SHA512013363ced72dbcb2ff67bc6e646407f77d6699de25178d0669bb7a86ba710bcf8d7b30f2d5dfe015c74bced37cc9f76afa2da372c180d1d5d35af4af13573242
-
Filesize
2KB
MD518005d87f58c44c184d5be1df27eea25
SHA100517fbeee86fce5bb4c723fffd00c6a513e952b
SHA256b6e1f2749c49b67e5e93cc5265fb1811929e77062c88686c59ea9f85c8ad166c
SHA5125546b5bff5778cf056a451057a5ca287006e4be28bef49255cfabf01bcaa4462e69237942585d83115aa658aded87359fd52b321a8479b43e15dd9c41df0c30e
-
Filesize
1KB
MD53b989b5d25f92dcb1166b94792a97f6b
SHA1acf3a2f05c023bac5f4592a345652e676571a239
SHA25659eb27f98c77021d61f0f656e3eefafacb8291dcdfed352c88aaa2234b24cddd
SHA5123e3397f129dc545cdd88d0c601d5d146ac20149082ae51d51b181b463c9e7c309f34d4ee81df8681d2a9db27cef44e1842e64bf645aafacf9bbfe657ada31c81
-
Filesize
1KB
MD520221824d07cebbbd2ef0fd0a0e8ba9d
SHA157741467466adb85f61e08d0e89adaac6c3c441d
SHA256475ce3d34df69a350e06906590f35052c916dd95528d418da11b8feca1594940
SHA512b7f160b4fe9402f852de946e455f5909228a8def910ab164028892a7bf76cb95af6e63820f494064651150438255e4b6a9ae1ef04bb3fc701f50aee962bafcfc
-
Filesize
1KB
MD5e63bcc5d9e7445c80db74179d3319dbb
SHA1ac9947e7448136e0d9beb37b89e448a6e10658e8
SHA256a55d33c755065f301d9900414c8d1772eca9990504bd057d2cbb6e332b7a41ae
SHA51244a982b40104662a8192850b4b700dbdd4d3b97427e41c56ace2b30d66cdb9d88a984b5626b09eb4fc237adf8e273f506ec0d423e636deb7e950df7fe631783b
-
Filesize
371B
MD5b7f333ff9dcd5ea8dc0f50064cb4270a
SHA12f92050de91d8718fcebe3b3ef53722bd45717dd
SHA256ac05f1a75695674b780918c09c7f54cc7a03537b4a7f59eba36d0fd4dff0cd80
SHA512a24332965a2366386f249798d7dd27b3a9ef7d889d90ccc218d48641ad5558257091a6cd44e24a475ef20452239788771073d93912603a834b950caba118c083
-
Filesize
6KB
MD5f2f50f84d8915bc4ab1b06546f1cce53
SHA11a087f85ab0791613d8ce4cf22bd33b358090d9e
SHA256dfb6ec79d2e92a218006a9115be0ee8a6a4d5d5a33bc6c28b06cf933068c98c1
SHA512fbf271afe34508561e0de4c360518fdf4e2e4aef6ce24158e96971d894e653f64350d53c4a3770316fb3c08a7d9be1279dae95db78143482ee5579dfee75059b
-
Filesize
6KB
MD51914e8a142f2edf0ac59877de47c733b
SHA1c7c404c4e408e93fa6ab3cf925a6d635d8e9cb9b
SHA256917e451214e479c192abb06b8a593a45f8d2bfa7e7dc24094c9c7ff28c4576a6
SHA512523fc37d9e3b34a0e6f28b84cb0ccd442097903a988cef63b9a6f9dd5794ce420ffe6b0f0f7d70fbf9231134efd9c29dcbc963bebb83bdce279965224af521d0
-
Filesize
6KB
MD5799b6db5eb71f7cacb6bd317c321b1be
SHA15d066e0f190a70170639a3af97df39cb797e8baa
SHA2562ce2f1a93b66d7407293d48e8d09cf1d1691ac3da595490d9fe5c5fedcb67160
SHA512df2a364b4b7200f07f14181af384f32b19e407f6773d666f324f7e7047e08125206e093bdddd7ac2dc727c6bdb1fd89ded9492477d68e6e07090893627b2da7a
-
Filesize
6KB
MD5fca8ca927840cf2c82ea88ada8a991e2
SHA16570b988489bf7653db296f82dd46e93a24d03b2
SHA2561bb5619de7e865d26546ce0d041d721d972c40ad90f56415c59025494a3cb869
SHA512d939a9a069606ec7e32ac0d0a0aa3effa473c8967a47dfc6c82cbcdfa9d40b3709ba4f9ae642dc83cb67b4076b7a86919c96de7a5bfdf459e298dff5e732963c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\blob_storage\70c86e06-6d3b-43ea-befd-46545aa569fd\0
Filesize16.5MB
MD5a725357eb37e4b43a65b9dfb50202c1d
SHA13308690577f8186444eeb242bb4e75cf45a6a4e8
SHA256c760b5f8e5dc948db88e266ad5b44322d210d2d5f54a0300d17e19c3f5d3906c
SHA512e1e8ea6e907c5afb29e392e02d93b2596839583aff3cecd7097611705496c7509b268d0c3340e819985715ce7b3cedb32972367f431ab9d21d7dfcf83e9766d6
-
Filesize
136KB
MD53781c7092f8d674c8d5ee7cc527cce80
SHA15733fa28b68b164eef92614f89ded3fa8274c415
SHA25641fca02eb7f3c63db357c0a374afdd020ed2f7588433a056c507a830dd89e325
SHA5127d179e3de29e8aac273a874d9376e61959838b0be8ec1da116aff2efd98b79397b159867506b06f2fc58328f6dfd95da42a9fa9bd7e5375a3f1b1e002ab7bb7a
-
Filesize
136KB
MD5bd1b97109feb30bb2b7344ec7c70627e
SHA16439d881c7d9c80a51a3bc754299e8ae84253f5c
SHA25675c3ad76a993b01d0dcc9f93a26d838dd458cbf66b1fdfd32d1ca0e9f8903248
SHA5124029e81296424e5afafea49a37df3597dc8f98cc0514a8d8ab1a98671c7b5fe5f8fc507f1ad7e335298e61f24bb3fc26fb14d1875af7e6ef9c824ed6ed21d46c
-
Filesize
98KB
MD5c07c091a984130717d71d0c1b13c0bb5
SHA1eeb46eb3df4d230762c95f4361a8055521eac324
SHA256db267e77555a9db7495cd724775c1153665901075e1bd4d09e10590fec21ef44
SHA512e5ee910a19fc5c952479a94c9f4aae6d288a63ccaea174e7389e69f565a1689f90f53b7a702c1a468dfa93a3514ca9d269bf602034b5944339ed39fa90813ee7
-
Filesize
111KB
MD5c21d27cd7098ebd854de5f099b2ecdbe
SHA16555b804f6ed19625f8792033e59871fcdd65351
SHA2565273ef12ed63f019fdbd22f83d1892543eaf099991c8e141a8903d3d71660a84
SHA51211a87656f55f94cb6fb8fab5f5cea2d8ee58af3ba4743e88d52d7b5bbda12f2ad992b6f5a0c7a308ef7a7da3a416b3b8d3b7fe300d50afc7a916b8c74091a84c
-
Filesize
93KB
MD5a46f0dd827065e26af6b6a4b30b001aa
SHA1d03364c1881be42b209d4b2a016f274e072d1c56
SHA256efb6fc4b31f8af52ab05619d98ed1268346708b5bd5b317b7eabe9691e2a51c3
SHA5122767513661ee060a1f7d490b79176ec902deb850863e391d43f35bfc27ffe6a03c96af8d72afae4905074dbbd54a928ae5c320a0582bccd5e3baa079eb764724
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
128KB
MD54ab112b494b6c6762afb1be97cdc19f5
SHA1eed9d960f86fb10da90d0bbca801aea021658f02
SHA256ec778e79c7a3c88eed2a6931a9f188d209791f363fbe7eadf0842efdbfafee3e
SHA5124f7a92834c576fdb55c3a5dc4990c4aa719083ce64ebbb70139d03ba485e7ae0d249afdc6c9810ddae3d106a0bdfc35b8fddb4fb40ad692f21c5c8ce3bbb1b49
-
Filesize
5.9MB
MD5463e7914d89b7dd1bfbba5b89c57eace
SHA17f697f8880bcf0beed430d80487dd58b975073fa
SHA256fd62ecf096773673d834f1ec598e0a3898a69c14bf159ba4e23b1caf5666923d
SHA512a112d4b0fafaa273fcfa012cecb1aca93f6a352241064137ef8bfb0437f88683cec37f97cedce9cfc944228399e9e481e7be6a6f65b50d523014200974c87562
-
Filesize
1KB
MD5e77d2ff29ca99c3902d43b447c4039e2
SHA12805268a8db128a7278239d82402c9db0a06e481
SHA2561afa31c6764bdb1d9d7e6c61bf7a6f2607fbc5061e7a0e5a56004694a2fd6f4c
SHA512580e3550c6751c58db5874eacde15aa80743625bf920d1191589c2aa7211896b378956dbe7070dcfe2f78a8028d92a8e6dceda8a8d2415b2600fc69f52833f2c
-
Filesize
2KB
MD533b75bd8dbb430e95c70d0265eeb911f
SHA15e92b23a16bef33a1a0bf6c1a7ee332d04ceab83
SHA2562f69f7eeab4c8c2574ef38ed1bdea531b6c549ef702f8de0d25c42dcc4a2ca12
SHA512943d389bea8262c5c96f4ee6f228794333220ea8970bcc68ab99795d4efd24ebf24b2b9715557dfa2e46cfc3e7ab5adff51db8d41ef9eb10d04370ce428eb936
-
Filesize
548KB
MD5c1978e4080d1ec7e2edf49d6c9710045
SHA1b6a87a32d80f6edf889e99fb47518e69435321ed
SHA256c9e2a7905501745c304ffc5a70b290db40088d9dc10c47a98a953267468284a8
SHA5122de11fdf749dc7f4073062cdd4881cf51b78e56cb27351f463a45c934388da2cda24bf6b71670b432c9fc039e24de9edd0e2d5382b67b2681e097636ba17626e
-
Filesize
19.0MB
MD5a504846de42aa7e7b75541fa38987229
SHA14c8ba5768db2412d57071071f8573b83ecab0e2d
SHA256a20d339977ab7af573867a254ca2aaee4bcb296fa57cd1d3f1e7ed1c5855dc89
SHA51228b9f6a0783b82c4a28c52bc849a3886df7dac95be488253fc1ca5839600ac7ce79ef97f7da0a18d7474fe02748e7078bf4b823ced10c4dc0f8352fc7b1d7dea
-
Filesize
21.5MB
MD5ac9526ec75362b14410cf9a29806eff4
SHA1ef7c1b7181a9dc4e0a1c6b3804923b58500c263d
SHA2565ae89b053a9c8e4ad9664b6d893998f281f2864c0f625a536400624d4fbd0164
SHA51229514a83a5bb78439ee8fb9d64b9e0885f4444fb7f02cefdee939984bb80f58493b406787c53f9a4bf521b2c03af4c3e3da4d5033eee8095b2ab0e753534e621