Analysis
-
max time kernel
66s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
Controller-UI/Controller.deps.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
Controller-UI/Controller.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Controller-UI/Controller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
Controller-UI/Controller.pdb
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Controller-UI/Controller.runtimeconfig.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral6
Sample
Controller-UI/Liquid_API.dll
Resource
win10v2004-20240419-en
General
-
Target
Controller-UI/Controller.exe
-
Size
325KB
-
MD5
59acf53306748e9d819b05a2a446e374
-
SHA1
bf995541ecc615896bf8ea9e2558b290af1a166d
-
SHA256
076352c68a282c2bf6171ee2d1f476e62986a41a1ed5085c2880500174a00eeb
-
SHA512
45d2fa680bdc373a78b9ca8add0279647e4394e255a4f46ba08a3e6642e23ec41e678b13d81ac91c00524a00cc1d3b976e59155accc75f6f1dd2ac944a6979ea
-
SSDEEP
6144:HiS4ompBUS3BZC0C1G78IVEcKctUiuid4:HyBlCI78IVd/W
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 31 discord.com 38 discord.com 7 discord.com 22 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589430080338127" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3580 msedge.exe 3580 msedge.exe 3176 identity_helper.exe 3176 identity_helper.exe 3844 chrome.exe 3844 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe Token: SeShutdownPrivilege 3844 chrome.exe Token: SeCreatePagefilePrivilege 3844 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe 3844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3580 3056 Controller.exe 87 PID 3056 wrote to memory of 3580 3056 Controller.exe 87 PID 3580 wrote to memory of 3016 3580 msedge.exe 88 PID 3580 wrote to memory of 3016 3580 msedge.exe 88 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 2708 3580 msedge.exe 89 PID 3580 wrote to memory of 3044 3580 msedge.exe 90 PID 3580 wrote to memory of 3044 3580 msedge.exe 90 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91 PID 3580 wrote to memory of 2524 3580 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Controller-UI\Controller.exe"C:\Users\Admin\AppData\Local\Temp\Controller-UI\Controller.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/invite/TUzTGVq2RS2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf4e146f8,0x7ffdf4e14708,0x7ffdf4e147183⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:83⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:13⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:13⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:83⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:13⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:13⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:13⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:13⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:13⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:13⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:13⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,4162421335104246184,4541996097496645059,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5772 /prefetch:83⤵PID:2596
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe06a3cc40,0x7ffe06a3cc4c,0x7ffe06a3cc582⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2220 /prefetch:32⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1416,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3416,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4600,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3736,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4816,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4160,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4416,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3184,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3440,i,3148488826767469231,4829513685373618575,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD55c6a3f00dd908d5b6a2100bc42c28527
SHA1bf2daf28605cac7dfe659dc68a1b20eac9dddb28
SHA2565343eed9d723920ca65a79cdceab3045887fcb3de4eb1fea1a83c1d8eeb453c7
SHA512e45c6079666641e594625e73c957755dca8230679aa5b6612ca84a1e13b3ee41e8eeb6728baddf9057ee13b8b011772215c26be46e1b175cda9107d49730654b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5382a8bf21b706d5c8dfbe5b697202506
SHA17966c1193000acf682cfe016b9ce0c41805c5807
SHA256b2b597f210c15d6df22004dbb386d8d46fe3011eb715f3e68b713cf9bc509567
SHA51209c52a0c7e72d4884f14bfc6c5b37c6e69f48031c1985d250ee857ecb2bbd4101b7a21d4c3ce64145e72ef23e8c155a3dc9e33d764cda0644b78a24f4f890ab4
-
Filesize
9KB
MD5aa7eb82143ee093ffd55c34d9f13696f
SHA1c79a00c42ca897c4956629dacdadf29ef6201187
SHA256c8f7310b31c9bba43c521879877ab1712b2cdb380618fdd25eb227ed7d88deb9
SHA51238bd671077f78bb7fe6d5492fdb87d365adaba619ab2668fa5f5ef648e4d6be725afdcd212a0f885ce2a9a5e71908e2c11ccda141232bcba6423f6c31c89d0e2
-
Filesize
77KB
MD57da17da123539410444f34e3e5a00021
SHA125ef3a372934ada05389253e0d70fbd1c0f11cb7
SHA256bbadb36d1560efe255ea3f785684557da51737b981e08ce5324477a3f48201e5
SHA512fe5c549279e3f8bb9171965217a572bfb76d541ebfc356a5352589caeda8c0785bb64f913577972a201ad992c0f009f1a9d1da002d2a3aae099ba54a9d549773
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD5ade1cade1ffeb144313f30ca011dd5b2
SHA1846a8f30425f7dacde10d33bffe13c15e3ef6d6e
SHA256f9084ede314c275dce501a8b0c3cea1699ccb29e263ad8a1cd2ba818d97aef54
SHA5127fa26c1fb3184daaf93867f3f752b630e785dc9e0d4131c670faf6407300779b2adca40106b4760273b2f583e219416d723b6b8913b4ed8341b3a84cd916f37a
-
Filesize
6KB
MD509ea019e85bcf7dee80d0c2821ee8d67
SHA1d394f4a554ea6cb7a39184a263c598eb07605c20
SHA256d2449a14a7ce40fcb2288bdba931729b5c4b86ab683e7b0acabe004231bfe899
SHA51295193bd70289b949f15d228ccf657190cf7105b2549238f287d6676da06617208d9e2abe207c18a3d4978ef666e77a4731fc57189ef99c655ac42dcc7fa03850
-
Filesize
6KB
MD558d559807ef324978d119bfad1ed1abb
SHA194c54acef07c6b57394d0eac67b24e6a529e2b70
SHA25666e7c1edc8e0e5e9b227fa869e1a0ffb1d6d4ebaf451e93d82b7daf4b47f6a27
SHA512a31dda445fa812eaa47a607dbd987ee9b4445cd37010eadc076ef5e83f6b4c6a1249e3612a11c59f5768b6cbb84c2215b1b281ab5da11cd9c3f7760ae20609f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5d2125d52b5fecb8c8e9d8f1fd8f46885
SHA1697311b4385e7f6b9e2e481387ddfcafa03e725d
SHA256833ff443c0012f081b566444f3cfd9d7cd8c559eef5011ccf2248dec01907d3e
SHA512a41f8e63b9b67c5237dad0d4b7fa18351aa61b5663be42485438816d27e6726d6c4fe43c3b78ea80b33f89cd4b175319c901784ead4636b04d9182a97ffa28a4
-
Filesize
8KB
MD564fec64f0297cfd9103f2ab8492dd711
SHA1ab901219f7ffc2385afad9a0a4e554bbda5eae26
SHA256a3010f6964e0813d468727915b4521040e24ef3e915104c69c8b97d17c033867
SHA512f840d31fd5b27187fa21d528cd31f750a2952fb86395c686aaff33a803a1ed705cb0e393e96b9eb4eb8ba0cba5f41f9953753179f5d5a5f92bc6a8deab90d94a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58