Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 14:28
Behavioral task
behavioral1
Sample
AZURE PROXYLESS CHECKER-noAnti_Slayed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AZURE PROXYLESS CHECKER-noAnti_Slayed.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
AZURE PROXYLESS CHECKER-noAnti_Slayed.exe
Resource
win10v2004-20240419-en
General
-
Target
AZURE PROXYLESS CHECKER-noAnti_Slayed.exe
-
Size
2.3MB
-
MD5
5122f846edafa2010c57c3e898b4a12a
-
SHA1
83132f608365e96021fe5d2466e3577d959415c7
-
SHA256
3c21cb1b6a535cbdfc874821b7836516ebd20ab8afb94b3c18636780666ff9ba
-
SHA512
f53a7469c2d00bd9e8949d6eb69ba7e8a3814d631ee1647fb6fc86c6fe6f9160eca68f9777bdc4721a201ec2dc4ad1234ebc6ddf280060edff52af7b6f1a668f
-
SSDEEP
49152:KfhNO/E5yqDpXtWqwK75F5745fzSjoZNQPajoNeOyJuhA:Kfh4s5zhpwKdH7gfzScZt0eOys
Malware Config
Signatures
-
Detect ZGRat V1 5 IoCs
resource yara_rule behavioral3/memory/1844-1-0x0000000000520000-0x0000000000780000-memory.dmp family_zgrat_v1 behavioral3/files/0x000d000000023b9c-166.dat family_zgrat_v1 behavioral3/memory/1132-175-0x00000000002B0000-0x00000000004B6000-memory.dmp family_zgrat_v1 behavioral3/memory/5064-171-0x0000000000400000-0x0000000000644000-memory.dmp family_zgrat_v1 behavioral3/memory/4872-222-0x0000000000400000-0x0000000000644000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe ms_tool.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe ms_tool.exe -
Executes dropped EXE 2 IoCs
pid Process 4404 ms_tool.exe 1132 ms_updater.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1844 set thread context of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1924 set thread context of 5064 1924 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 136 PID 3872 set thread context of 4872 3872 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 146 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4340 5020 WerFault.exe 86 3820 4872 WerFault.exe 146 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133594793137424931" chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe 1132 ms_updater.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 1844 wrote to memory of 5020 1844 AZURE PROXYLESS CHECKER-noAnti_Slayed.exe 86 PID 3048 wrote to memory of 1988 3048 chrome.exe 104 PID 3048 wrote to memory of 1988 3048 chrome.exe 104 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 2156 3048 chrome.exe 105 PID 3048 wrote to memory of 4316 3048 chrome.exe 106 PID 3048 wrote to memory of 4316 3048 chrome.exe 106 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107 PID 3048 wrote to memory of 3616 3048 chrome.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe"C:\Users\Admin\AppData\Local\Temp\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 5523⤵
- Program crash
PID:4340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5020 -ip 50201⤵PID:3320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa5bcbcc40,0x7ffa5bcbcc4c,0x7ffa5bcbcc582⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1604,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1600 /prefetch:22⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2372 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4572,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3700,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3124 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4496 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4512,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3696 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4836,i,2582929314404378519,1357993788355776521,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4496 /prefetch:82⤵
- Drops file in System32 directory
PID:1212
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:60
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe"C:\Users\Admin\AppData\Local\Temp\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe"1⤵
- Suspicious use of SetThreadContext
PID:1924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
PID:5064 -
C:\Users\Admin\AppData\Roaming\ms_tool.exe"C:\Users\Admin\AppData\Roaming\ms_tool.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:4404
-
-
C:\Users\Admin\AppData\Roaming\ms_updater.exe"C:\Users\Admin\AppData\Roaming\ms_updater.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe"C:\Users\Admin\AppData\Local\Temp\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe"1⤵
- Suspicious use of SetThreadContext
PID:3872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 6283⤵
- Program crash
PID:3820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4872 -ip 48721⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD538774e688535cbbec9e11bb4345a458a
SHA15c4fbc1176e95e5f34f96f5ed1fbe2b988b17591
SHA2568c6d1e2fd6cd9f46421b4ba59433c28d319a621e5ad9055e48ae35538e4d9d8b
SHA5121d6d5373134efa7540a66a671fab14840bcf17575baf1dffbe0201e6611c5124b4fa3f0af9256de1318026d9e195b4592bc2092f272ffd2ce8a29fe4c52cb9bd
-
Filesize
2KB
MD57caf21e0b43d860f2d0feb5121f4c93d
SHA1507f9eb41b197daf18b0ffc215542385f7fb098e
SHA256b226c1891b23e4b813032db9164e08797151b1bebc5e3549c2aec88d27f343d3
SHA512adb192430a7b0b17dd1cb5e8e25e2c29b9cbbe6c9fc3cfbe37ba6ce7e5d94eebfaa5e5f7fd8693a34655762daf60cb1941bfcedca5f83cefc671fd35adfb0fe1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5d8953eb9f1497cb76e3a0ded80a39dad
SHA1b89e85c2b55b9f2d31e3aca88cbcf83aa75fdd3a
SHA256a4b7d4e6446b19e64ebaea3f9fc354bee8ccbfefe0a8eef2eb3b725368369208
SHA5126a73982f75a9c2bcac210fe36d11a8c2d05d3630ec5f889dca891a9f48533ab7172d115fe5bee05a2495badcd00ff09ba65367a0656a571eec7f7ab0ddf9b5e3
-
Filesize
9KB
MD5fa1ff88e5ec37395be111bd78170ebaf
SHA14a20736615f5a46760e32c25c01e70fe90ffb1e7
SHA256108f77cff262f4bff086d3e70c4acd173f9df2fff66fa2c04376356e17d8854f
SHA51294b5eeab52de3250e62d1d8ed441b707c47d3cd05663f4727e5d6bc08b758b87800646417e93458b3ce39dbb0a99e50e057bdc498cef324da1ce2d9ea51f63a0
-
Filesize
8KB
MD53753294d69bc5a89e3749d5467893d52
SHA1b483e7c121bfab2ae68e89371124b7bdde3ea26e
SHA256c5f5cf2bfb275f30a03b26291a36cfaad236d99e314c0b6469db4fbc8a8252c6
SHA51241e2ac9ebc7c319e253f70da923e6f81caf999ab0d9c09147990ae931a211f7edd1c647049d50858d8e44e7f302c326b180617c9a392ef3defeb7c7cbfe3d3d4
-
Filesize
9KB
MD53da56d57ea86ac4c0e28d30a621be900
SHA1f946e118260fddb94446a73b75aafa792b0e5e03
SHA256247b353e711635c91186e23f61f6aab4893d541fc6ff2d2285a8b279365ec369
SHA512627d8b57b50450ce8c26fb8f033197d4c81d9421b4cc6e5fbff2a3b4053a2953f0e58de8fbb8482178f5b8e29ecb7ab599f4dc4e3a40db3699f4f330d07559c5
-
Filesize
9KB
MD57c46c3c536c0f7266415fb764d0d21f5
SHA1bb204edbd644fdb2574de511d593d1ae4182d15e
SHA2569347dc29e9404a74c831adddb93ab04f874b274c52f56d64365b125c729aaebe
SHA5125a8bba7f3e739b5f723bc8ce2d43c96e5b58e8692fc3bd2922cb7a475fc44edf656b5dcabd9cf40ec64798d5aec6aaf3609176dddef5d44dc4bb419a01038131
-
Filesize
9KB
MD5ca749ff41154eb3a11f48b2779a990a5
SHA1e9a16223b077ec35f333d74da4bd53e11b406652
SHA256be0eb7532298e286ee572043fb6c12804bde942e4f959760f7ba7da3b0dc184d
SHA512aaedb4ecdf9e29c58486ae73c6fc7ccdd3888c016275721d733de436146ab968c9fcc64581d88da287dbeafc4fb9086342f3a608263d3f4ed5edcaee430361e9
-
Filesize
9KB
MD59c9b407e99558aa40ef85ac6b36bcd5d
SHA174f07fb45c50f62e4adb3ffa6975da8c5e4bc8af
SHA25667effe44deedfe71be4ec2cae5906de19f3e43bb9087bdbb3b92101f741b0e68
SHA5123e2931715502de325ce36daa2f1d7bc530095e19b6ba71a4c9b14e4b37a4db48e8249495e11f4397bd0671744b21b66ae095960b68cde94e8cf1c21a287ef0f6
-
Filesize
9KB
MD5f243136d9cd43091272df3fcfba5b59d
SHA16fe6e404290ab3aa68613bba49855bc3aa722f79
SHA256be32e32afdcfda8ecde4db79b8e950a33004dd24a389d25c700619d58623913b
SHA512aa7af96059a75511f5bf1a3354c3a6f203ae519305e5f0c6d3da166f2336db698ba18ed8c4e9866700496255c393668de325534387a3067ddc49902378f34009
-
Filesize
9KB
MD50a696e2894f32c4958f45796b84c490e
SHA1c485583fe814656b11113e13cb1706070e871b55
SHA256dab3235c8ac8cfea834435e04702662e75432437f32cfbaf8016bb99d0f13088
SHA51272a9c0c78cadc9186fae2885572a239daf577046842fc8985b2f7a7d0cc30ba4c5d601b4ee6068a4941a7ace202bc057cb969df645bb59d82e880316f69d9a2e
-
Filesize
8KB
MD5d74cf03a388e86c47a798bc636dd2871
SHA1bee91a9f7ff5b8bda667875fbe41c0470e0cfdbc
SHA256b7cf2ce844af970370a4e7508ed41ebe6f0a902f6250cb8fe434db5585444eb3
SHA5121e4dca943f052d0ea0f6ece130c331f445df382770c28dad0998a29fd9b7e05e1632e75fa927d0169e03d42fdfe48ecc675593fd8f84720d04cef62051978633
-
Filesize
15KB
MD5ec90cf07634e0190ab51965b12262adb
SHA12c58817172e36b3446a790bb787e8d437a7a8fc3
SHA256a27be87684c4ffd6f1b0214def8bd6a3160e62d7a3ec25dd3f90e7729e58b9ca
SHA5124121a93b15cd271df38386fa775ef83947b24e978fdccbeffcfd79faa8996b0b7c672db079c39f7012f4b03c61c5d4ce38444b84fd722646475b07d042e2b244
-
Filesize
152KB
MD5650979d1540f8405c76b65ab584a39ce
SHA1e94ad1246a0b612e7424a3fddee3ba4b3e284356
SHA25659391fcd2cc7a651523119725c984711836abccb7d7b5c3b16724381bb426419
SHA512ef4aaf23fa034fd6a8e618c78bbe0a03768ab237426d56ed72c119d9ef31d1fb924df46f6b8c320d8f95460d2d169bec480b20467a001a44eddf30f66b584a21
-
Filesize
152KB
MD52fe94b54a797bae0a8b8464390cd3fed
SHA1ee03550cdebd6bf6d81a1246cc6b5eba8132f5fe
SHA25681d80beaa5ff523d3cb398f4cbb1b9339ea4128fe3c0714d6cafbff4b58f05c1
SHA5128a6a53932d18bb0c6793994c008be14f6a2f4eb4ad1f6782c7dded80ea073ed382c06ccd35dec825f79c3b441a94d53c3dd526e08b2511f0cf40ce347af372da
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AZURE PROXYLESS CHECKER-noAnti_Slayed.exe.log
Filesize42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
11KB
MD5f8701952b62a7e52652271a20b824128
SHA182292b1cd54afa277116b42f4b1c43c8933478f0
SHA2565b0b886143ffe9f5c5750c9b171656783668b655e559ea95d002a265586e3413
SHA5125acde46db767cf11ea5183007542fd67e1512ccfbcc37efdec685e2db369840a767981b0996dbace0f40602ada0a5c0aed39019ce06590151cd59f0dfa5d68e5
-
Filesize
2.0MB
MD531e5e3ac5a03d60d67188b6b0c3d152b
SHA141e831bc8b0c314a46d17492ded7b6b587d66db2
SHA256dc73ce51066fdcd5f0c7c88fd6fdfb9a4a3722ebe3d2def1dc593fbc1af9e467
SHA51264837c66af3f63c214ff8f466266f3dea1cf135d54ccaaf5c06fa13763045d79220f88d09ca49a36668d7e1f506bc74c9a2b8de0ec77aac272b0e1466aa168c2