Resubmissions
26-04-2024 01:08
240426-bg7pssgg38 326-04-2024 01:04
240426-bfebvsgf96 326-04-2024 01:02
240426-bds28sgf73 326-04-2024 00:59
240426-bb59sagf53 3Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-04-2024 01:02
Behavioral task
behavioral1
Sample
EMO.pdf
Resource
win11-20240412-en
General
-
Target
EMO.pdf
-
Size
225KB
-
MD5
84e1ffc8db5cbcae237e3581fc21924f
-
SHA1
688e5360cde7dec84d0aa19b9d4141236d021bb9
-
SHA256
6cc092d750ed58607c82b2e06f4b83daed7abf961852c2eeebeb888a8a2428b4
-
SHA512
d463e05357a8904546471f57aebfc427c1ea517cdf17b1054f6efe42d7a40fd017ad4168679ddafbcb686feba31756f54ce75ab2288a2e4b6a41a6872f19c2c7
-
SSDEEP
6144:qhsouQoG/OXwjLl6GHtYXpizMlw0fIo3WqTA4t:qpoEe0l6GHyiAGqUg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-801878912-692986033-442676226-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133585669465509308" chrome.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
AcroRd32.exechrome.exechrome.exepid process 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 1920 chrome.exe 1920 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
AcroRd32.exechrome.exepid process 3200 AcroRd32.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3200 wrote to memory of 4040 3200 AcroRd32.exe RdrCEF.exe PID 3200 wrote to memory of 4040 3200 AcroRd32.exe RdrCEF.exe PID 3200 wrote to memory of 4040 3200 AcroRd32.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 468 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe PID 4040 wrote to memory of 2320 4040 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\EMO.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=124B9E1567341694F979D1683CECD390 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9651816B5CDF2EEB142250C05AF3FD0A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9651816B5CDF2EEB142250C05AF3FD0A --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:13⤵PID:2320
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=18C7545A8DB5A10528874FA829A84A96 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1916
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=60F92D104FFE4694A726881A34196C2D --mojo-platform-channel-handle=1936 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1344
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C84048816C3D8284C998C5592F6BB903 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C84048816C3D8284C998C5592F6BB903 --renderer-client-id=6 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job /prefetch:13⤵PID:2232
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff38bcab58,0x7fff38bcab68,0x7fff38bcab782⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:22⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4220 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4400 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4784 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4036 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4392 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5116 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5024 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:82⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5236 --field-trial-handle=1776,i,15121759353310171859,10255021552448799892,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d12fa8f534cec7c61e3862178e89efb4
SHA12b3efffb7c09d9247278d0099a1fcad4bb04cf0a
SHA2566403c080c950eac0b1d03be7fc75666ab9ee04aac62aa59877e57b68b3109bc3
SHA512ea263657901cbf15311a07765d53d5ef055226863f374775e4c2f6193e208e0766aa9367fae3bec6f69d1f909bc5c73aa5f5db62072044e32d671f30dab90105
-
Filesize
4KB
MD5ec5008d17241a67039e20e0cd835bed5
SHA17c45ebf99ceb28d8455e23412ac7d75c0a4513c4
SHA256c00c076b1da6f7b344f75dcbc3852f1c8696e2fefa256163b1f355db8e813d68
SHA512e6f12fc48b469182b97a27c6d6675943d1ad735084329c7a639033a3e01ff137f2f4867af5a0cf840f2fe71a3e2c82b8cc3c2dcebc749700dc3ec92dd43512f1
-
Filesize
4KB
MD51de6aa80dbef2d03dcc326522234518c
SHA1fe08a0f494667a8d4cb508c14246a578d1ef8f6a
SHA2564b9624998f0f2802e31ba49485fd85a7e93eb9c51d54ad7bd524c39cc0c67cdd
SHA51253dd68b8c5392a97e87fadfba3305822bbfaef90f6254bb50bc91fcc1b4610879ff02f6fa746a3ac37ad4294d41d98d17e7b083ef923f135ac7e866530c6c90a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5208274d5ebe62235bb9ce6cf31e1617b
SHA1cdedb37d7951ef3711e29e6f4a658a4dd3c1804c
SHA25674f0ce31d2042620531e9537d9192fffc8f7d41558d55c2c327e4cccfab213ae
SHA512869260f7057f83b1dbc5797fb017c4fa1117d85bc6a55873677ef82a04083833c86b5c49f18d56cac9bddab0d46b52358e18dfd623be663ed122597d5efbcb1c
-
Filesize
1022B
MD57ea49dc4072d547bd1fd2f1cc6423881
SHA15b1536c638304077525b27daafcbf748a4e4cc27
SHA2561d3852884f4917932529a80dc0319235821f628725f8f50751cddb2bd618b805
SHA5126226b4cf56fa83fe32d54035f25fa76c2c578280b03bbab183aafb09c9f589d6ce8fd25ac516599b44683f6b553c52c66420705a287e0cc8e12086fbb3c796d7
-
Filesize
1022B
MD5fa6a5a0735eabafd3db16f18324c97f7
SHA1ec4aadedc3171ccd3dce365217ea88b1b7ac59e4
SHA2567543706b9fa67b6c6871b3225aefcaad3f4c45775c72e85d17f84939c091f06b
SHA5122bb3ae1c931182e8e166ab9a965fa862e609abb994dd5e081d83cb48b7b661fc8a0d8b2efe24290a996ad18b7130316a9286403c63e85e9363c43ebbee433af5
-
Filesize
354B
MD5247b98f5da8e3bef15a7f0470064c419
SHA1d5aecb59e4dc2f1ee3b65112fa0ff0949c21b964
SHA256ffac1c031dceb1f989f4b507a30c4520193de618bfe4b0679434d9c18e31d051
SHA512a6b232737990def8a366780571891869bd85abba819119f9d9512b0978e1ab43b6e20ac36b37fff444c8ed4acc90ebc9a51ff34f16c79b068f856f24401fb96a
-
Filesize
1022B
MD534e24db2d8cbab06e7538c3ffc0043c8
SHA130715346ca5551aa4ae02f4012c7cbcb3ca04d30
SHA256530f6d3d59eb0d80225acbf192f6adf8df5813fab830a5c0b448d065460353d4
SHA5126bb4d4556377a8a328e20fcabd4eff3c137dc9ebcb3c35800d7a13ce9b18a7931e6386f3e97eb3e01fb2101eb9864b366abc3198886c101df13325dc3e0bd1e9
-
Filesize
7KB
MD572f0d8ffb63c6fcaa4ecc3ef03708b40
SHA1911f7ce955ccea28eee6ef206058de3f0d98f9d4
SHA256bfc23e0f4e506f8327ffa190c432d7e7badfde0b4076650116552f04d5d223a8
SHA512f9eb5b6d550cf046c16c043505553cd84316bf957dac2f5478746a386909fe0e35dae1f192982b89ceae26550c57ba7076fd30c52d41accc659cdc550277b202
-
Filesize
6KB
MD5e303ae296e334345760572e16fb5be2c
SHA1cc9c59d3bb0d30ad99764feb4f24d69e8d686072
SHA256505f0217b76912673ed1154a3d4762290c0d6f4d1d07a8ac330675f14149ded5
SHA512c331fb3aaf5b5ff0cf121bf205b67a16ba7c78d19a852a98d43671570684d7a965e76956f6a98a816fb085b7310bbed709f01d1ef5f24015420667919dfa7a13
-
Filesize
16KB
MD5c64db91db16f06ea7e473d0671da1c04
SHA1ab56ab316bacad7da7b010b8dfaa7fffd7d064ca
SHA256b35b3bcddf4c7cef26b86a89d4a62a28e986b2a313c1984b866c9471cdfdff61
SHA5122c498cd365fed93a4819e3653c38fd9df840d76a29ffe45465e7037ca113d4675ba427cb9e03b9b23bd43d118ca1ec23939e1702f0f1ab81488532fe6b0fe937
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD522497e837ad464e0618fe9fffaa503b8
SHA1e220fd3ba010235cec9d27707aaf3fecf3d30b67
SHA256630af7b52bbd693c4bbdd4aed0c9f7e1294a79fcdd1ade13988fca6dafd9fabb
SHA5122f8e5d44b2b8594e8df1a606be3b9382a2c4ddefeb073f8a83ee792b4cbfdb14282794336158fdab6ff5618bb40cd42527d1a002a626ff0eb2ed8ceef4f898ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe583592.TMP
Filesize48B
MD58621c002c4ae7bae5b5cad445a2ad07b
SHA1865ef0ee357d3ad8b7e77a38648ab9cc8710344c
SHA256add6ac68a8a2205ab27f9e9218a5f04a065cad865783b8ce0f966559b62e44de
SHA512c3ebbbf2034fe6068c3eaae2550ca18ff27bb4a4598a0a537fd04b04cebcbf8f9fe66026e0d56fb6c9f75310055d9b93ec115b52ae605f9c568ee67b8d147b3d
-
Filesize
253KB
MD59297253ee676527758e2b8f6d089d175
SHA178c8e3ccb5dd2cb3365144cc9c7233a9abdd7478
SHA2564dc3b2ef48980cb23eb9e951d8f5a04efcfd6f15d444ecda0f66691099869237
SHA51274e984017c099d9869f3453030ae7e8539380f6044a54d7c867c9a6c2faa4753f3acad6a3c3c63f6cf0ff585d8ec8da32171a6f4a8af253c38606c48f3651eed
-
Filesize
83KB
MD55531c94c2a4231a5ab2196eee07eaaea
SHA1714dde57c879334858eff875fd6a090201469d59
SHA256289f4d249612f8188c491c0837c3c93e46337c4700d9cf1ca6f17cbadc340e80
SHA512f3cfd81c9feda7a2756a7af62e6c5d19d14b780ad843c91bb45520e62e125aca6811966926c9b13861cfd72a020d0d2b0f646bb4d3f440f32a734d92770ecbd6
-
Filesize
82KB
MD523992ee1cd92e9f810696899bde855df
SHA1ef14a83a64c7a1e6b3a41535743c1334dacbb684
SHA2564e3dd7901c2c0665b8a35f7f3923e1c6401c40889c993fc873d891c0a0b22cb7
SHA5120141f08c5355ad8b7a1db142693f2e0a79dea3626fd930c193e2c3811c339bd546b24648b925487d0079be4aa370378ec0ee12d7237d766a8066ae57ffcd0f83
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e