Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/04/2024, 23:14
240429-28f92add23 129/04/2024, 00:12
240429-ahdbxach81 129/04/2024, 00:07
240429-aekxksce73 428/04/2024, 23:25
240428-3ee1jsbg85 628/04/2024, 23:25
240428-3eed1sbg84 428/04/2024, 23:06
240428-23d8gsbg4v 128/04/2024, 22:57
240428-2w8thsbc47 128/04/2024, 00:03
240428-ab15dsbg5y 127/04/2024, 01:18
240427-bpghksfh78 126/04/2024, 02:04
240426-chqy4shb7v 1Analysis
-
max time kernel
272s -
max time network
273s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/04/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
code.js
Resource
win11-20240419-en
General
-
Target
code.js
-
Size
4KB
-
MD5
a0958eec5d861c11e857b83f1a6f7701
-
SHA1
fc9803b3dde18a1467af040266d5e02c5f798ada
-
SHA256
badf7be152d16ad7fc2e87e5834e3e9be4357dc2e9743866ecc8672f3b18576e
-
SHA512
55af1f39a75d8c41a3993c8afcbd52565eb6ffbd6997d8093000700d931e6dd647dbcb6bfaabda766ea64a9a37e6bf092df46cbb16ffe1e02291fd0624f12fa4
-
SSDEEP
48:Eyu9yvCnwdZd8ZaiSOxj8WmJrT0fMuyHD0KQxgeqYk93GkUs++5ZLUIZL5RKS7d:3uMCnwjpiFmJrTHD0KQ41U7IZLr7d
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588230811924644" chrome.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 412 identity_helper.exe 412 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe Token: SeShutdownPrivilege 4172 chrome.exe Token: SeCreatePagefilePrivilege 4172 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 1412 624 msedge.exe 84 PID 624 wrote to memory of 1412 624 msedge.exe 84 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 2744 624 msedge.exe 85 PID 624 wrote to memory of 4204 624 msedge.exe 86 PID 624 wrote to memory of 4204 624 msedge.exe 86 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87 PID 624 wrote to memory of 3148 624 msedge.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\code.js1⤵PID:1824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa99163cb8,0x7ffa99163cc8,0x7ffa99163cd82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1840 /prefetch:22⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4396 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1324 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,4873182315662539121,668190147385145896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa95dbcc40,0x7ffa95dbcc4c,0x7ffa95dbcc582⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1704,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1716,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3744,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4276,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4312,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4612,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4332,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3688,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3648,i,17166704944022211315,3188172887025428466,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c105487b6d20ccad329f0488e46b84bd
SHA1bd46560b914153201b69cbd29614a8dd70c0760b
SHA25631f80e926c6f7574c146c65ecafe1572c2578502e59505a27f74be673fecf4b5
SHA5126a7d99e29698341cfa6f5f203b8f5a345668ad268e185fbeceeb68b45181c427a8256c4e93fd86d33376d0ab0d478d474ed8c3bbb3c6529bea5f0058307d4cf4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5746ca119a72d7b048a6307b38c3b4b43
SHA1cb35b72465e0e640dd2c910d23eaf46fcbd7ed55
SHA256b8769ac852c3aafc17537f533df48eadc3501911e1bdcd9c9ef4003d17898ab6
SHA512151bf06ad1a10b6285e27ef9bc7836918407b8c4750d2445b83fb05c28a9d4a1a184858b04170200d306ae5c7f0b21e9e77c64edc7ac4d6f00cea3fb9ac7094c
-
Filesize
9KB
MD5abb620cb4c1955510c1f05bc0af799c2
SHA141523ab2a18717827fbdec32c5ee934da6b45c5e
SHA25668b6c14ef58760c84866a226081f803d560df33e1da7798b4edbc13bbe0b273e
SHA512bc04aac31a21169049ca8e74745752783fb40a40376e0f4c721c45c9010e90ce4c333c30de2a9a1a962b3da300a96a66a42a2a0b2c23901f3194bb710f883049
-
Filesize
9KB
MD5ad9de54c72e2bcc1084ba3d102b86408
SHA16c93602ce7662935b6b78d45992126b9733d18f3
SHA2565c7755b8bdb6133216c6b71ecc975f9a47321a7dc73978685b854f4f755e87d9
SHA51298b951622a4db2cf88901023f05b407fee1d69b1999f159625e738c65bb084a1a3fcf4f6d83e9a428da531b881bfaff719a4f287356492622c3ef50cd6c7c949
-
Filesize
9KB
MD526f4240704aa49eead74b829ff70fc78
SHA1b124dffa2381f0d2ae30b6f804ee8f33a856f790
SHA256ebb54132f7dc92dbe397a599aaf4a38e600cbf6fe8617da9f0a4b74c46eab571
SHA512625abc4f9c879916c93c1a4bd7b738d15bed98877a89a7b5915d8cc1776e0428499364ae542fcafee115b99da6895cb6d8f695f37cbfa814bd65c681c806177d
-
Filesize
77KB
MD5e132e698c5b70d0023c3793404ae35a1
SHA1f229e73eb18a041b59afcb57fa5dcbcc499531b4
SHA256ad1a57c260130c3ccb086d7a45b52d7fb3bcddd9ac2ddc6892021763a9cc8902
SHA512ffec3820d73e9781c7af9de6c34b52a65aa9247345912ccc2783b7e8bedd2bc26718777984ca7eb58d8c62465508da2abc0699ad0d8e65750181c2d175c7f128
-
Filesize
77KB
MD5cc07e45861197705e2706c8068da95c1
SHA11ce0c7ab4bb2bab859750f48b48584814cfa5e0e
SHA256b3867e3ed0db13fe8d1dfa773856eec003f9956212a66613441233f623cab3bc
SHA512c428cc7143fcd68fe911dbc52c5386435e7ee8be4bb63666dc7c5e7fcbba69289ade0c4389d674267175df5dbf00dd3912e90f916887bda5050975c746c4ef39
-
Filesize
152B
MD58d5e555f6429eb64461265a024abf016
SHA105a5dca6408d473d82fe45ebc8e4843653ad55af
SHA2560344fd65882ba51695a10e1312e65f08d58afca83771c9d545e181829d6b5ed1
SHA512be5edfdcda1ba0db9fbab48ee1b643f1b03821e24048892d18033094fec14171035179e987a08dd91a1c25d91d9256837a4105f6765afd225a868f3e95050b8f
-
Filesize
152B
MD5b5710c39b3d1cd6dd0e5d30fbe1146d6
SHA1bf018f8a3e87605bfeca89d5a71776bfc8de0b47
SHA256770d04df1484883a18accb258ecfa407d328c32c0ccbd8866c1203c5dfb4981f
SHA5120f868e4ce284984662d8f0ff6e76f1a53e074a7223122a75efa7bb90d0204bc59bee4b36c215d219a03707c642e13f5efce0c3c57f46659a0cb1e7fd2f4d3cf1
-
Filesize
5KB
MD50adb106dc931257bcfb849e9ea9cedae
SHA18f13f8b65824a57ebac9b7c11ca0e9878ca87bdd
SHA2563997ed22958970fff6758fec85c991d3d370edba95079658ac7108c38bb78b84
SHA5123ba9eae3d222aeffe8e9c05c84c3b86bee261bc9fc317c082fe44b342aadaca598bc2ad539ed3937ecd4fdb366769e1c0e676c22d285b347693dddca40debc54
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5ffcbeb697f046523cd4f26998c8e6f4a
SHA1b5a12c70c56fa04b7f930f05e95a81374c9ffae1
SHA256fd4212e124c6f5f84c175317ea4572614a0ee5e9543ec24982bb2d296342f125
SHA512f1073326c87fe3d365c10731eca354d339480fd1ef74b361214ff3cf2170fa7966e1039c73c15bf361889ff41c6906d3c493d1fa0b4cb0500830445e95dbe25a
-
Filesize
8KB
MD533cab4be2e48362da223d6660e486915
SHA1939e0cbab96bad93e06556332b84f6624370d6d2
SHA256c83861d383ec06f3d0b64c43bcd6b06fdd5da4dfb1aedf0f1d2c89f6cc24975a
SHA512f806a68e01b437b2680742954dbd260ed4f4caa5fe46df144b9005eaece525e052dbd9399c3b1f5e15afdb527859d2985a966fcc33515a14c3a39e1e97062551