Analysis
-
max time kernel
185s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10v2004-20240426-en
Errors
General
-
Target
sample.html
-
Size
19KB
-
MD5
254a49b8e340c86d345b3613bc6427b1
-
SHA1
881475b7753f560b181e3a02072af552d257e3c0
-
SHA256
a635bcbe92a0ce6e34d87e8e8685b2b193a5f9f9ef57d52380464add95d511f3
-
SHA512
6ab6fa4994a7b46c3f09aabab4c62960e1abe1ad3efbf627a33b1e4822a2c187d8021508e8f8e07936d0d5f4b15cac12a74679852ba2584554de3ca1304b2cd0
-
SSDEEP
384:raN579vDpmReVoOs4ni9ylKeGMpU8Hhhb1DM7DS2LjMrSA+xzIJCgMmVn:raD9vBVoOs4nmyI1M9BhbJ6TMrSfsJ2Y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" HorrorKrabs.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" HorrorKrabs.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" reg.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Firefox 21.3.7 Setup.exe -
Executes dropped EXE 2 IoCs
pid Process 2684 Firefox 21.3.7 Setup.exe 508 papaj.exe -
resource yara_rule behavioral1/files/0x0009000000023502-506.dat upx behavioral1/memory/2684-527-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2684-539-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 110 raw.githubusercontent.com 111 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\Desktop\Wallpaper = "c:\\windows\\update32\\bg.bmp" reg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\update32\bg.bmp cmd.exe File opened for modification C:\Windows\update32\bg.bmp cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591512689960543" chrome.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "156" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 4128 reg.exe 628 reg.exe 916 reg.exe 4716 reg.exe 3968 reg.exe 3876 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4584 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 3796 3712 chrome.exe 84 PID 3712 wrote to memory of 3796 3712 chrome.exe 84 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 4104 3712 chrome.exe 87 PID 3712 wrote to memory of 3648 3712 chrome.exe 88 PID 3712 wrote to memory of 3648 3712 chrome.exe 88 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89 PID 3712 wrote to memory of 4700 3712 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffd8cfeab58,0x7ffd8cfeab68,0x7ffd8cfeab782⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:22⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:12⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4272 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3308 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3224 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3192 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4244 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5152 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5216 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:1568
-
-
C:\Users\Admin\Downloads\Firefox 21.3.7 Setup.exe"C:\Users\Admin\Downloads\Firefox 21.3.7 Setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7574.tmp\Firefox2137.cmd" "3⤵PID:5040
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:3876
-
-
C:\Users\Admin\AppData\Local\Temp\7574.tmp\papaj.exepapaj.exe4⤵
- Executes dropped EXE
PID:508
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 --field-trial-handle=1900,i,12580165221304903883,10426955054644166387,131072 /prefetch:82⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4716
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\Temp1_HorrorKrabs.zip\HorrorKrabs.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_HorrorKrabs.zip\HorrorKrabs.exe"1⤵
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\krabsetup.bat" "2⤵
- Drops file in Windows directory
PID:4984 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\windows\update32\bg.bmp /f3⤵
- Sets desktop wallpaper using registry
PID:3220
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵PID:424
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:4128
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:628
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵PID:4204
-
-
C:\Windows\SysWOW64\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:916
-
-
C:\Windows\SysWOW64\net.exenet user Admin /fullname:"MR KRABS WAS HERE!"3⤵PID:4544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin /fullname:"MR KRABS WAS HERE!"4⤵PID:1196
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d "1" /f3⤵PID:2508
-
-
C:\Windows\SysWOW64\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableCMD /t REG_DWORD /d 1 /f3⤵
- Disables cmd.exe use via registry modification
- Modifies registry key
PID:4716
-
-
C:\Windows\SysWOW64\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:3968
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 003⤵PID:2672
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa397b855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD50c2234caae44ab13c90c9d322d937077
SHA194b497520fcfb38d9fc900cad88cd636e9476f87
SHA256d8e6f62282e12c18c930a147325de25aef1633a034eaf7a3ce8de1fb8de09912
SHA51266709f74b19499df1e06700e1c257e14a82ca4287194e4b177b3f333748d927f413c8c459a35e7e5a2f92d28410b0129f106d94e3dd85bc0dd0b986add83b18f
-
Filesize
24KB
MD5e1831f8fadccd3ffa076214089522cea
SHA110acd26c218ff1bbbe6ac785eab5485045f61881
SHA2569b9a4a9191b023df1aa66258eb19fc64ae5356cfc97a9dda258c6cc8ba1059ac
SHA512372c486ac381358cc301f32cd89b7a05da7380c03fa524147c2ddf3f5e23f9b57c17485aaedc85b413461a879afc42e729547b0c96c26c49bbdb7301cd064298
-
Filesize
44KB
MD5a4b04ba2b9a56f5911fee0c29629e53e
SHA1939e8e65e22ae978a6b63dd1400fc6f58c5015eb
SHA256523d8983d24e050e6e7e1f43d0caca6bd77bef38ec046d181b13bf32702fc025
SHA5121c3357e9ecd3ac0de53d14f5d4c8d8d0aeafd30cb2e0dd6cfd1be68cca4fd4e178e79938a5ffe9a17b43e4f60f6e8e08c1054fa44160377fea740da70761c80f
-
Filesize
21KB
MD59ccb3e387ecf1d1c32d33a33b61db8f3
SHA19d6625afcaa4d6bfe223268ccf82ff32ea9532a3
SHA2563d34b64d0099f608de0e555d46338252a99d36f2a25af7180702c9966621fa0b
SHA51205c3d41fd4115bd66c1a938ad644424f8df93f96ae27004c800e43acbc4b23568456574ceba605ea696fb594585811fedd0f9ec547a697344479e4d7516f65f4
-
Filesize
2KB
MD5dc6242b5a2f8bb2ee961f28e965b9c03
SHA18e9e29e97b6511010ba86765c67d96db213f7df4
SHA256dea47b0306953256dc1a5d132c21da77c09456ad0a1473181df482ef2f3b8805
SHA512629162450fe9bda55a1823616dee3a37a1736b44f917823efe4c938911000fe5c882e08c6a11448f0cb602a84757aba9b32889cab28d4226b92eb2e5a9ae3c56
-
Filesize
3KB
MD5921202c4ed560eecf8d6b1a3f96fefff
SHA1f7bed600cf2a4bdf8859affeddea92672e8c591c
SHA256d3e62b65aa02e30a38e00b11c64e3a3060b4e7daa017078d822f2058c4936dc6
SHA51280928f24425899d2a3b667da47ac93191bf1fa1348e84ccaada356a464cfbb403059edc81f7af2cdba2e51b76fc343c0fbe080fb8634510418fa30325740e20a
-
Filesize
2KB
MD5319ba571424f72da146301cef3d0a506
SHA145d607b17318af778120a979fe283f6d283ac91c
SHA256be244c612b2d16d2b126a53cfec02bb32e64d797b1431cca70d6e057c08d10a3
SHA512f609c59e7b30da20e367276476332843446458b5fa9e01383da5b4370e50a0522194433d9ca2c31cb82c5a4a3e809a2b459b9df04eaba1e8452d9c7890e9f4c3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5641551597b808913b7ff0bdac60f205b
SHA1e2c91ef7af37da6881e8e22cfe8763ccf15f5968
SHA2565e31dff22aa3502b2672cea43e6463de45ad9d5c4309fc51c4457e7a3f6c0984
SHA512b9db4f1e2e4fc9e2226fbbdf6070ff9e5d7b9e8bee3f3dcb84d560128d562bdd8b3d66b21a9b4b79065eabb1c4503a5280379c896adee4cbdc03e4118ca0d9d1
-
Filesize
1KB
MD5eff98951ce024d3acd72f05612d20d4b
SHA138e867af840ca4b87574d4df2156bb170d7fcc88
SHA25675b970bad6ebf06c7e6c3f8c0c726d30f42d64bebd507e220edd69e16cdacaba
SHA512d38155e74fe6a4b948f68b22fd43a8297f989e64b05208f9977534d8e39517d61591dd3d057f9c0abee9416eb4ba72cc155e05bb99b4e63390f59eaed69b8b81
-
Filesize
1KB
MD59188961641f108ff1fad3c5fe75e55ad
SHA157661e522deb01b2e56b61c7eba0f3bedebf9a1e
SHA256d26264a8a62e4c4e9bca0e5d2f932c8430dcdbd884f40d37646cdaedf61e958a
SHA5127042e55b9b00f970a965ec2a711870e8d68c7367b7913ec8d6a4705cd7843ec77f7e2c98a414cc139300b61fc9173f0617d1aef94600e532c09b7a703f5d1da9
-
Filesize
1KB
MD54096656df094e990b858f4c799c9d073
SHA168833c4377cf06272790e77aac98dc471d86a01e
SHA256e573d6bdd9da8fde1e9aedb5af46a15e05b22eac0c699907ec095c496dcbad62
SHA5124c45fe5764ba81e66d5704a3ebe30e8d581dad19105f93689c6cf8155f958527ea2e586f1d9e61e313c25129f4cfe8f1da41cad2abe51352f51b769b9d170390
-
Filesize
1KB
MD5e3557ac50baf3a6060a98c9fb74e75a9
SHA1f13dc0320e7575a608fd38546ee5cde13b3d32fa
SHA256987060876e5cc8b9a656f5154aa8bc4767fa1747773b6b173fdf1a29606046d0
SHA5122d05708053bda2dd56987d39b57636797a98b4ba26cf27cbaa5d0c4be4dee2bd6b2b6fbb2e312e0944d2c9a206ab3aeefa6b6421038fe62449ae6ec018c9a1ad
-
Filesize
1KB
MD5dad3b80a253437638556ecf77cce5ebf
SHA16364aefd7f019a5305e88b41b562e0b914b2a14b
SHA25633422e9b3289ed55809fa8434c6440b16ad7ce81fa6fea209e1cfb0979e8db4b
SHA51234395fa09835d0fe20d0777be88c28de7c481156092b42a08cb43302187b5e5dc8cf74d43bef2ada093c47be74dcf5aab70d7eda9358ee66620e35f32616a63c
-
Filesize
1KB
MD50ee61f3b954bc09905946922f99eafcf
SHA1d89c7a0bf9e8c1512ffe42a03fe66502e2812253
SHA256b5de39b8297c7e2827f64f9a807770ccbb18a07d1869fd07893492d0b9ce4126
SHA512351355155fc72215bda5b6c8fa9a179e1386311e1ed7eabd156315df396575eb3cffb00738b399854ee15f1bff2b98cb654473dad3a661d1e1e617e043e839f3
-
Filesize
7KB
MD5ac4c13499664ce1fa01a9b78398d59b4
SHA1e949d431001d81614ac73e4c34a91de55cc24461
SHA2563ede8adb53fbefad052aecc38c1ade8cd34b1c34aad78b1a02a75d44e896eb74
SHA5122f548b51e6dc48121975ae7a227e9016d4253745da788fbb9e103460ba5814fa8e705002da38d211d6bf6c24f0f4e0aabb5477d7010389dd64f5191d7c039ad4
-
Filesize
7KB
MD5ccf703279872cb21a45a1540cabce996
SHA121d58d41e07939841a7334c8b3e142bc9d6eeeb1
SHA2562a42e42d957c098d22895e59358bd463bb80ee55785a7aa6fec51ab56efe2b69
SHA512738ef087493fe4c7491ce4948d19d193a6dedf8792f7ec5898ef49c5114b58b456c31804746e0a381a969ee4115951857f45962d1e97073269df9515e9db8206
-
Filesize
6KB
MD5a16e179c7e784c4eda2e2703e0b3b9a3
SHA1d3ab2aac606828b3ed5d1100f705ca9a2ed73815
SHA2566e8da7770f70222e2db46a3dc3ba07dc867c9bad8978aeb694a4e40a42caca47
SHA512dd383a5ddad0c3e58d0c015e3a14644646a322a6794bbe2dfd2961386105abff2f1065c8a4a46d972f192d2439dd069a896c690f7fb54d3ae7d9b51ac54149bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cb71a685-dfe5-4fc0-8db0-dc365fdcfe7c.tmp
Filesize7KB
MD5302027ecd679d8c61e0733fc65c3c881
SHA151fe120d2f2cae229210749090d4760510a589ad
SHA2561cdcc58c6dd0db5ac613101fb1e693eb1094561ab25dbf9184688d111c4a0d5d
SHA5126d1a5eadad56544317c4a35afee250553a6222b250ed00d2559d950536577f041bf96b39f383148c9e7992fb5a675cc7220f1b947065d723213d89c166d624e2
-
Filesize
130KB
MD544ccff0d26884a2993a0539f99ecc1a1
SHA1f727f3777a1970e206beaf666f242389e1a9b1fc
SHA25653cb5c050318a6ddbf4a06c150341fc38182f18063a03b11347a2ba404050f70
SHA51249032241f2679fb45659682c2cb7435380a232634e23820d0491dd9491baff5e19fc00db9c80f09f91d5979f05cafea1c6930d25ef1b9966e76581c9f003d9be
-
Filesize
130KB
MD5ea206642ae5c700977aa9b25ffd7666f
SHA11f96c21bcd9a18f462d5fa7092455906a2789f30
SHA256a913bfc58abd09fb98076af119be8c099b68187698a9217afc4990e27a6e33a3
SHA512cb40d0b6854dbb89af836333f24ac4ebb0b7d991864604e6fc4cc6e827ba1e065a5f8dcf5fc99924656213569224f49cf00303b74f70b88f06da8252278cd75e
-
Filesize
101KB
MD59f0f51104ff2356cd6a76d402b423f6a
SHA121ec85839e11cfcf79e67e414257528f7b4b8c74
SHA25698c49bbb2260ad30bb9b43f9deaef0b38dddd2b4fddcee6bfe025682004c2b95
SHA512bb2c65bd432a29bf0e2ae83575358c81a33ec68ca025db0eb163e33579fd23f8d83c609aace5e8c7d9f12de1eb895f53e4fa783f8d16638ad4e8b6580b3bd219
-
Filesize
88KB
MD5e2c2e20eede1978165087ab65db05449
SHA16224cfdb698ce482b608eb4491d78bfad53022a9
SHA2565d814a4b04498703ba6ef7a319b08ea7e64caeaac75300abeb28f725f286115e
SHA5127127c0b7da0f6d94144d159550a9369fbc0e2f8d659eb11d33273b9707aa5925f1ea47ee6c53a5e12ce132b7aa39fc4681a37183a1510d5f4e4bd76518a941f6
-
Filesize
310B
MD5141b39729c97b1601a94b88ec4541758
SHA188d3c8d1175c93f0489a7614e1ce55e64fc25b49
SHA256fdc9c6ded6792bc9f158f0638fda6f44da8e625553adeada223d8abd7ce0b663
SHA5128e9da5ab576837a3c409bda6e08f43c375af8dfaf486859e2604e48e621acaa09dadf2b9f393b5dea9d17a7dde5d36052667b2a7e10f270944c10a69394e9f32
-
Filesize
88KB
MD5107ae8b0226ca50a2a39c9eb1b4a31c1
SHA1515e99757bf9fe05b8d840238651a1c0ba8ee577
SHA25699d80c79b645feff55265bc82c1c31589209fe8df93c311afa58a6845e337312
SHA512723844497c7a5dda33548b1a9800816e7ebbe050f9db0a5d5d061d1f2d7ee16861856c06a35d859fb1f408a8d84fd1482e28187ac5cf6b51fa5a5de28b89ebf2
-
Filesize
11.7MB
MD5009b9f7e5b7b45674e6de11dfbc5873d
SHA1fc848c11b0eb1c48b6e49e59bfb2df069ccf7756
SHA2565b40b1922ac983f07ecc3e444813734aa03ce3270b7e5c0dc93610e34ed58de7
SHA512cfe2087b0711a5d7ce486f338c49d5c6147b3c931f13b3ba27628200f26c3a9776de91a1cabd7bfd274a08fbe7b8a4f9ec172e4f7cfbf3234c8aa35399d03549
-
Filesize
1KB
MD57f5a110ccd8737cebf3f52b49424eecc
SHA167a0a8ef8745e20b1cc100a2ab95cde32ad7959a
SHA2562ae0d42a78a32d4f8f81060cbe29b95eff8a90031690d2b7cc70d540a6110d03
SHA51268d4d79c3007b50dcbd783f6e3020b8e640613c79943c8cf82456dcb7892baf0466b4f2dba4a3b9da6240cb305acdb3c9000f7b80bf63649ade767d8963476c4
-
Filesize
19.3MB
MD5e1a919b2c68ec9e615b390adb8064bf0
SHA1a0cab57b6bdbe2dcb888ea07fe4ed161916f6398
SHA2566166b3e0ec7478ac54b33edaf001fb2421f15a559bcc0f37f09c08a4e466fda8
SHA5123e837cd486806d63516488b2ac0a514e2e03bf3d7c511a7aa6c532c0569580cfbe81311d57b4a3621ee151806994e0935cf2528fadfe275a8a9a3242610a4279
-
Filesize
163KB
MD534d62303e757aac3144ad3478619fdde
SHA1a6fa411c5e8b1715568805ee7d09150d96ee8977
SHA256851fed5d7b5c0f331d61ff67eca02c3d0bc5214848bdaaa5f6069a86050792a4
SHA512248358ccdfd86cc56ca77edbe5aedfb656751d312dfff9598f1eb59fb4494ff07566011417808b94451064f0e323c3464142f1b03d337ca5a895c0d435b19da9
-
Filesize
12.5MB
MD5b075e5820bd51ea1edc114d8643dbecb
SHA16a88b93c174423486fad95346dd4c6f9958ed2d6
SHA256216f31c18146824ec864ce1cd25980075831e6194e8fc8995554239a3070f62f
SHA512798eda968adb4eade2cf58c967200587a163b9b0e3a650d37e3b1424b721734f01f820ee22c10b906c084fe78c73c8e19bc610562b80fe127bacdbc8d3c21f0a