Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/05/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe
Resource
win11-20240426-en
General
-
Target
8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe
-
Size
1.1MB
-
MD5
acef4d21e38bc01764059c9548c182d1
-
SHA1
60fbab0ae0a76bad7c7e44b02545ff32c2a2188f
-
SHA256
8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c
-
SHA512
d2fc3fdbadc70d766b40b5304e928c220ae7249d0aa9581bc56012532f2706e7956ca0d3da02c4f56d7987af092d3ac312ee80e8bdb5d8fbc0ac7b498788260e
-
SSDEEP
24576:ZqDEvCTbMWu7rQYlBQcBiT6rprG8auJ2+b+HdiJUX:ZTvC/MTQYxsWR7auJ2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595212585479682" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 388 chrome.exe 388 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 388 chrome.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 388 chrome.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 388 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 77 PID 2676 wrote to memory of 388 2676 8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe 77 PID 388 wrote to memory of 4692 388 chrome.exe 80 PID 388 wrote to memory of 4692 388 chrome.exe 80 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 4916 388 chrome.exe 81 PID 388 wrote to memory of 664 388 chrome.exe 82 PID 388 wrote to memory of 664 388 chrome.exe 82 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83 PID 388 wrote to memory of 572 388 chrome.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe"C:\Users\Admin\AppData\Local\Temp\8104a6f4b5c0da5cd6d5ee8e9694633b37d588a0322d03b78f0bddbf2ab3ef7c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdec3aab58,0x7ffdec3aab68,0x7ffdec3aab783⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:23⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:83⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:83⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:13⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:13⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3832 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:13⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:83⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4524 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:83⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:83⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2396 --field-trial-handle=1784,i,14451151652507878612,9162368733024670129,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD587870176facc92f73f8c54d849b1628c
SHA1f47673b1e6f28d34632da584c0de4b70a9b0689e
SHA2564364899407288db11555fc86ed9dd0e5a7257d261d26c5729736e3a5b2f0d732
SHA5129a1ce2252152106df968e1336feaf73f153909915bf19aa6f52b3d6d7bb5209976d360bb6aea3b70f4374787299709ce7c0548ec2bd528a970f5a045322d3f04
-
Filesize
240B
MD53286cdb4cde45962d05fcb8696f93485
SHA1807c9a715c547b58af3ac539fed14ac72dc72abe
SHA256732d6bef0ba31d9754ea98bf085d7c566ceeaee3812ddce00d9a8b01beba59a4
SHA5125009d1b33472e116099a61803582f8491e82e8381a0276399f297a900a6a6e9c49bb6b13dc39b22930abe3a8a496fba785fec7125a4b48f614077e58a791056f
-
Filesize
3KB
MD53e78e0cb36af0ad11d5c611c65807c7d
SHA127d28d9ee7127e8de36e274e0940133f33791785
SHA256e9d6a2a42f0a5dc5eb4c14c9987acaa12c8328037a7d1ca92736ca24cbd87e39
SHA51293f2261ee4018506522155cc5a881f4c5e8b0910c9db26cd0059aee674b17d25401f5a10fc484a9bef17f7b1b04bf394db6f85f30ecd2077f2da4b1a4bd37867
-
Filesize
2KB
MD5105378ea0c9075858eec3f362153b6eb
SHA15cca84fb508771f1c1adbdacf26b5725c23de0fb
SHA25635f246d377e506d978593947090ca9e3149ddfad1bfe1a335e9fdd559fae6efe
SHA512298509f29a14e27c48a2415ca07a5626c63eca684fdb713303c9f0cea80f5e9e20456c0cd17159d8e6de7b0950ae5574e7d161a1517774411da72c747339d7e6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5556e13b0f5ed2f59a1c171bfeaf91730
SHA1c9d3d37e252e62fb00c1c1acb248943f2b3e2f37
SHA256ba6ec3abb9ba6ba080aec4ab2e34ea7fbcd317001610b924bf50db4bb4ec857b
SHA512bd45c36930d668159c784d29a9cc217fe6222cbbc87332d017eb829c490a5c750d60dd8021a450a27e2344ff7579efa89150bf403dd9b45bd4f1e88a3618c454
-
Filesize
7KB
MD50dd6ee508ef6d457a0efe5cf0b50c177
SHA1b059466d21900c4023ab6609c301762a7d4301ea
SHA2566339f5af23f4672b7a4badd95796c907adcb40767faaf3c82329b0584bcd5805
SHA51291c3c253dbc9c50759415d1b78142b2d31793c5b45480b765dc01690699ed88990322db995d3a9494d03ba9997891362d67946b3a81ea41018bdffdae59ea37b
-
Filesize
16KB
MD5288eee15be15a042052a0024d4acda31
SHA10f4ab6066c10415c9fdeb36e0d0d46914279ae87
SHA2563efba471ae04dd7300ca9120f150b7417222f9e8367368ab29048b17bc5b91b4
SHA5125b4bf118b792f64d4e84b37630c96defac3a9968f334392414d062e2e6bb85a332c2b0641f59166604fb92b370454ac7c24af4cc7038c7fac761c01b9caba261