Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
267s -
max time network
266s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
28/04/2024, 18:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/KilaxYT/Comet3
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://github.com/KilaxYT/Comet3
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://github.com/KilaxYT/Comet3
Resource
win10v2004-20240419-en
General
-
Target
https://github.com/KilaxYT/Comet3
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 656 Comet_Updating_System_.exe 4224 Comet_Updating_System_.exe 3788 Comet_Updating_System_.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 46 raw.githubusercontent.com 47 raw.githubusercontent.com -
Program crash 3 IoCs
pid pid_target Process procid_target 2852 656 WerFault.exe 90 2232 4224 WerFault.exe 96 1128 3788 WerFault.exe 98 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588014053645477" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4636 chrome.exe 4636 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4636 chrome.exe 4636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe Token: SeShutdownPrivilege 4636 chrome.exe Token: SeCreatePagefilePrivilege 4636 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe 4636 chrome.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 2084 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe 4748 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4436 4636 chrome.exe 73 PID 4636 wrote to memory of 4436 4636 chrome.exe 73 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 876 4636 chrome.exe 75 PID 4636 wrote to memory of 1160 4636 chrome.exe 76 PID 4636 wrote to memory of 1160 4636 chrome.exe 76 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77 PID 4636 wrote to memory of 4900 4636 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/KilaxYT/Comet31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcb6319758,0x7ffcb6319768,0x7ffcb63197782⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:22⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:12⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5284 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4484 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5304 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5292 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:4016
-
-
C:\Users\Admin\Downloads\Comet_Updating_System_.exe"C:\Users\Admin\Downloads\Comet_Updating_System_.exe"2⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 17323⤵
- Program crash
PID:2852
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1812,i,18260390954273056674,11354595776682986251,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4664
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:4144
-
C:\Users\Admin\Downloads\Comet_Updating_System_.exe"C:\Users\Admin\Downloads\Comet_Updating_System_.exe"1⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 17042⤵
- Program crash
PID:2232
-
-
C:\Users\Admin\Downloads\Comet_Updating_System_.exe"C:\Users\Admin\Downloads\Comet_Updating_System_.exe"1⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 16962⤵
- Program crash
PID:1128
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Comet_Updating_System_\" -spe -an -ai#7zMap25594:106:7zEvent113251⤵PID:2992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Comet_Updating_System_\.reloc2⤵PID:3612
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4748 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Comet_Updating_System_\.rsrc\MANIFEST\12⤵PID:4408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eb6b0fd571aae32bd4969c00eba4c2ab
SHA1276d647ea6d1fe9cb517bfdcec05a849d8f037b9
SHA2561c4abe42da1fe412f973fad536497512e02f18c77212740d796082083cee5ecb
SHA512e3e3f9424b3a9f8110ac7d76ef91283738a06501635814b437115d3388f23e4ebbef64a5626ef7816dda2c562e80e835d4ed16e665bd0c5c12a5d1cba243e2c0
-
Filesize
2KB
MD5d38cbe481f0e326a985ce7025cd48a34
SHA1ad6395b1389b9bc33013b65b7124edb375988056
SHA2563aa7353cd3e836a25d4e2720e9136d7a3c0878a6d3b2878c815b39f72fa71d54
SHA5121d9638d8fbbf60ffef1f74687d76eacc99a978b2eb2ee99bd0adb9648f496943084360b83eaadc7b3e7d612528dd2d4fcb4cd0fddb5b73d1a37c2e85e7d075ff
-
Filesize
1KB
MD50e9a8629b8bb2e99ec0c9ec61f959986
SHA127ce10775723cd5d1377254ae4aac139571100f8
SHA2563e452ff3daee042f36cb913758ceb9a339c5fb5bb35f4486729bba93c08e416c
SHA51201c745f6aa4a0a7210f27f8ec88ac66595f35b078b93b5276b6b54fe2a6b2a481c339a581e2a8cc36b8d87c530413e1f7e772b5fb098c6ee2d4c45edeb8d5e06
-
Filesize
1018B
MD568527a973cb23c804e670dee880f4a93
SHA1a7173a4d9ab3ffafedfdaa98dd1ae524bff9bfc9
SHA256a3a0db8ab2e37ec04fde37a0d6bb59a66acb4fd8d76132c5becae51d8f31feca
SHA512f1ad571637e83f77edbca93c0a58647abdf4adae00a8b74432127f6174510186ba357e1bf9fde4a65c86fa6614d65e58174fbfab7a2b6db772f083cb04d45789
-
Filesize
1KB
MD5bc7a5c9a8f2875b58290d1f7f2349568
SHA186f34cc7dad97ea88f09988efe61744adc280fe3
SHA25625722304630d6c16cb38c2de18fe9f979fedab670fe44b559524959922ad122f
SHA5129b02c2ef3a03dcb9e0f4e8bf1b38868a54049337ded61d91362292c4a570989b1b752a6b9c39f245539f4b472f3bc3d400f81dc4b5190254e95a5ecb2c211df0
-
Filesize
1KB
MD5220f3926bfe16764b00762c5b53056be
SHA10caf5513c49fbd610e124455a965c3a82ffbb962
SHA2568ca9a1500b7f8e0fbe59366d623a4c259dded2e18c98e4c0e84308223cad5507
SHA5120952d319c99140e28270eeb61951633191b60897cf0b9a433b8ff8d200f805a22f440fd2111cbca1abb5759afe39d1033fcfd75dec72207e5c759735d3091553
-
Filesize
872B
MD5b9d75e64ad327d07169a1410e2e6ab25
SHA12eb057262fa9f91d55e8c44eaf0163d1252e9224
SHA2564420e27db3fd0d0f16f168bf6399cb0fd389be1519117b35564e80d25a4b15a1
SHA5123dbf3acb212ed1414d5ff87f29cc29e04e9f7bea2ce64d7dd290088e9614348de427d7beea65485287c2878f5888731b8027eb89eafa7b105d0fb379d3a6dac0
-
Filesize
1KB
MD5e17c6add4a1d0a3dab2cf561e295e202
SHA1a1406c2648aae802b0473bd1a704d7287bd9aaf4
SHA256e4921d05315197e5bc6d9cd2470769b3c649482022fcda842b71f1ecf4ceced9
SHA512635f9662d46147736ad6b1db75b54ba92fd4dca5bef76f0d5c5ac122dd6d5d80335b8cc34fa800a89fc3a7c20d0c3de9e5f7c96f198da9b2477a47b4a619da02
-
Filesize
1KB
MD53b2572afd377bcc530a064898e82e509
SHA17745828ec85da73b7118b6b7081d02b7cd4839f2
SHA25620467935c2e6d26f06c448ff78559c27e70db519c14993a5930dea925a25d422
SHA51289c7a76d60fc3bc68957f8f0ea96f4972001861081ae17343053ddb2eeebf3f14334517596e9ce10ef0482e061d8955779d6d87c161c59a3359e77d3f0b01085
-
Filesize
5KB
MD538f81b6ab74e7819f4594597ec8da6fd
SHA1b9b3ac79b02d4f17c3e611d03b5e2e00ecc6bd17
SHA2565c8bd5f90c1ad684f8f07381025facaf4075529acae41d25edd342d337120eb5
SHA5124f17afa54cc0fe8369988f61f4bd45e833fd39945da0a532dc55a654d7c07cd9cf2e42c4bfe68a7d034adc57ee18d14ef21aaf2640cf5cc839a41e144a608ea6
-
Filesize
6KB
MD51e29611c04d16838942b2ae583780a56
SHA10e40172ff1d8c70d838da6939a353ca7308de501
SHA256c75dd56d05a40f43cfd27e16b5105f4c56bedaf34183e12f1a1fdcbc6c7d7159
SHA5120fe2bdf2e203412ac3410fc83fe98e8ef10dcdcc08c68d18bbf17ac24e365af3ad29da1b4e98240b212b5318d80fd7d2b5f61ffdd35bf065dc2f272235f4f4e5
-
Filesize
5KB
MD5e729a45f2774d12ea4f0932a5d92dd7c
SHA12dce335ef97a06394c54196df1797d3b5a3861aa
SHA25694d37b96e3e7296e56af49a375e06e056ae885f2910a166c0d5173a5fa9ef4e5
SHA51275de2ac88f04f35c6473eb0f516221ba35aefeb9848061d4caee226245e6342dbad47f73ec89f7e21d7f2b4cf4207230e7dd64c9a99e68d600ad0f333f5a2070
-
Filesize
6KB
MD594d6e1eb76acae2f6ea488947e81a07b
SHA10e775e835ef549572dde3277287f6c1ec42df6a8
SHA2560d04c460b2aba86e3dab8f89c0a7a5d70c07ff790ccc675504b8ea24eb137d29
SHA51254efac8f58752609534036e7a44de2add510e97fc38e3013edeeb90e3f9bce87f0853f58a45dfb4ad92ec7cc7d917f1711a9223d85229dd7dcec56a3ebe4f78a
-
Filesize
136KB
MD5e506c5006b9aab0a566605b46187fdee
SHA1c29d0e321b18cc64d60f3193ea43885458e8c887
SHA256aa7aec26da55fd3dfaf5adf185724f91cf4b3c8ff4193ff963657470d4980119
SHA512e12308e093d572bc23631099a3f49155c29fa04ee6a6e6e71e5d452fb93b05ab47485497be3b9bfd7e888f050165878e2463308811440df3f03a8dd41c81515d
-
Filesize
111KB
MD5fc8c9b5d12ddf68fd751ab85c3ac9449
SHA1f6afe27c3fb90283cf73b5b3e3e0745ce566e4be
SHA256a096ecfdd77f292550262020ff2ca1c2a8d2880ec96d66d92f8bb67ad4897436
SHA512d9871f9a20c6605b575908b0bbfc62b8e6a15061f998d9a95132034a7e7abec01d6eee7ef81ec8bbc615036e48456f971034f93406fd3bd44493b1bd94a2459f
-
Filesize
105KB
MD5d8fac74368d828117b0a7d49cbd728ea
SHA1da0baba5bdce560fd671e5ff1be431538cd7e493
SHA2569f59d46499fd5b459bd372c4c743bfa5e7fea5154706fa74149c3e09003906b4
SHA512aa5a4fdc8b842206abfd535b6a3acdf4bd60e19959665a372a86bcc5426968a8a97c03d95d7c915956d41d91b832573b9025b6342e54c6fab574da186463f97f
-
Filesize
98KB
MD5d4204d529e9c5b0daea27429e36104bd
SHA16833b42393991f2289bd9b57de3870f39b7aed30
SHA256849aad3ff9077cb4fed37474978dd96d70068d0256af6233b3d4af14527086c9
SHA512bdfc466ba7c889625deb1a3f8aa7d0e64abea960efb4ffade6877148bb22677aaf9729b61fd77f9f43e6ad75725b07a14e694c980f8d4bf5acce539bbbbed4c8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
5.4MB
MD51003e8ddb4fcc7359ffc1c79f2ccbfc6
SHA1b6ca44de0d7a6d4b6fcaf9a6ecaae921fdb52a9c
SHA256f1b40875fe6d909590a9c1ce583e6e6f5e80ef3e29dc7a2bcf0f9d0235cb0365
SHA512ef3e3e6d4733c370899ea1dd4301fe88b81276f36691331a724cafd76a65149d1d1c9727b64c114484f1414f36b1bd160df204279ac752f83f018bd3192a8f38
-
Filesize
512B
MD55160676317b9ad9edec30b3d0542263c
SHA1214abb8b8f607b21afe917d877ad44b3bbb1e158
SHA256dc3ed02158bd2c11d9fa08f6a56e7466af7862bca4e211006ff51b8fa2d615f8
SHA5128a67b579f4d70acc3f04da088337843fcf69a763a8babbef80db91554fb6e4ebc0ea2f65cdada75dc8c0463feb15beb2d5eea2214e79618e5822da40102aed2a
-
Filesize
3KB
MD557fcfaec2d20136a806be9a7d2b7cf41
SHA12db8a6d07f888e487413a24b9acb0d391d99b47e
SHA2568d7ebe2cca08441e4f1950677b653314ec0733c909fe9e09908ac6b6e4320aa3
SHA512554795b24816bcc8d74b80965776f9d9d4f753f3fec8c9a369806e71f6f02a5605dfbaee02d90dda40ed8679400f92b962edf1f3e8cf3e30ba1e9a0e23473999