Analysis
-
max time kernel
1049s -
max time network
975s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 19:13
Static task
static1
General
-
Target
wallpaper (1).jpg
-
Size
28KB
-
MD5
bdd8868b21390b0f69a5a0dc956a492e
-
SHA1
c1aab129d3c0f73a143fbbce40de80b12cc4a003
-
SHA256
4165a8ea1f11af46b2ac475c41bce70b498007c31e366707c81c8890afdd77e4
-
SHA512
865347cc8637c1282aa737c1012ee05ddd2e50b255b75191f0179f7b28ee04e2fe00320b51f8cb5a9e3de640528531726a296f0b30b16b828451e7d42864362e
-
SSDEEP
384:glIaWtdyGKa+GorT05y/KVNC1+YwcPPmAJyyZsw4575Dwf9fsdYHl5Bp1GlT7EHj:kInd52yCPPPm97mFkmLp1m7ED
Malware Config
Signatures
-
Processes:
wscript.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MrsMajor3.0.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation MrsMajor3.0.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 2 IoCs
Processes:
MrsMajor3.0.exeeulascr.exepid process 2012 MrsMajor3.0.exe 3500 eulascr.exe -
Loads dropped DLL 1 IoCs
Processes:
eulascr.exepid process 3500 eulascr.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DC03.tmp\eulascr.exe agile_net behavioral1/memory/3500-479-0x00000000008B0000-0x00000000008DA000-memory.dmp agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 87 raw.githubusercontent.com 88 raw.githubusercontent.com 89 drive.google.com 90 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 468 chrome.exe 468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4892 wrote to memory of 4568 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4568 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 4512 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1584 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1584 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe PID 4892 wrote to memory of 1520 4892 chrome.exe chrome.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\wallpaper (1).jpg"1⤵PID:2464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff083fab58,0x7fff083fab68,0x7fff083fab782⤵PID:4568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=556 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:22⤵PID:4512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:1584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1892 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:1520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:4996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:1168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4280 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4448 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:3592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4588 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:4112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:4044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4748 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:1544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:2400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4748 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:2072
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4996 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:4472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3168 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:4396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:3040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:3984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3244 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:2180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4396 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:4756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4756 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:12⤵PID:3556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4312 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:4648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5252 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:3472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5352 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:3284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:2600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:1284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5252 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:1516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5376 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:82⤵PID:4432
-
C:\Users\Admin\Downloads\MrsMajor3.0.exe"C:\Users\Admin\Downloads\MrsMajor3.0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2012 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\DC03.tmp\DC04.tmp\DC05.vbs //Nologo3⤵
- UAC bypass
- Checks computer location settings
- System policy modification
PID:624 -
C:\Users\Admin\AppData\Local\Temp\DC03.tmp\eulascr.exe"C:\Users\Admin\AppData\Local\Temp\DC03.tmp\eulascr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=844 --field-trial-handle=1924,i,15207684500195926349,17367364578259300441,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9a80c7f3-56a4-4709-a405-acf3ba302997.tmp
Filesize6KB
MD5ad34ff1013ef34795efe50738d9b46a4
SHA19725391932d94416ad83d4537f385efecfaa0643
SHA25669e88985d00fbde4209ba457dc4eac625b88a47e3ca7b9b95f46b6ff82603f3a
SHA51256c5ebfcd1d3eb321e12e4b3d315f6f66a1e26339e9d959f3b2cc593d2334bc96f05178bfcc9ee89e805310c82417d898468f9d5cd8a5121bb677ea2a7ac2524
-
Filesize
2KB
MD5bdae79910c1f1ee01c3ad1971dfa272d
SHA1f62761babdb24f539ede093da8ca19323c3404ca
SHA256edb251d5f2282ce461fc204e161dfd47c6e9bcd2bc9872a922814d1b7c76a8d8
SHA5123ac767f49cf620e8442e76f8d2f36df6ed50f0d2f1e67b2dcd353545aee4184bdec72c99f5a77b8dc61a241c762ac6eccd97b06daa366651f36ecfe8f254764b
-
Filesize
2KB
MD5ef098a470ef4743f63a392a15b0885ba
SHA165c33189b2a6d6c3caca4c21ae3388b524685f05
SHA25689468c453e70cef24dca51892f4acd9f4edc856b8e18876d4b7a529fb91fa739
SHA512bec44ba0be8ae93956c6c92cfdea1670e58cc8f706b45de7db0b49c6e1897ba5cb84ebad89ba96aa41cef016bcefed616de0b4804e9a3d732bc81a02b4eb7455
-
Filesize
3KB
MD5202c97581673a03518074eaf7e459fb3
SHA1865e5090c6ef84c970c5ae13bc4ea25005049ccb
SHA2563a728a799504242c91261585426d27325f64d06947f57632871d630f5d584cf2
SHA51270884cd35f2e62fa155b6d7de4d2c806220d41f33466122c998a2d2427c296b43721035883349235f4b74e0d4755f1e8be6b9d2ed886e24d1d45b6e9c649edee
-
Filesize
3KB
MD5f546c05658d5a3a83fd659c5f730bd36
SHA12fee03098e8f54d816ccb06a650d29bf834cf4c1
SHA2564eca5f95e9d4939341c8b123a2cfdda670fc384853889a43522ae893f69a0c16
SHA512a073d43181ddf18a33ac40f2f389272a0a4f4f3f477acc6179843590dfa0c4692365afe60f11525bc72ce8e1d71277f4d9d286f9ee750e23e63fc1187ab3c885
-
Filesize
2KB
MD5dc88643dfd4d6671dcc36239e9484414
SHA1337f3ad7aaa00c62ac9b5486fcbba785c4a169b4
SHA2567c6a72f751f14702c155a4b7d3df41a11d84486d757cb21dce201009b7a37d94
SHA512e46977d9abcbbb26fd8605b97cdeeaf6298e4b17641ba580a29c144094f96634073d8426d0196f5a8f51ad795c2e49956579186571d8f26f92e3660a91f94c5f
-
Filesize
3KB
MD539699b7a1e78f3080359736b47dce963
SHA12523272ec3dfa7d506b50f790321960110e22c6e
SHA256c13050c881c7260f26800ed2c250f19e08fdd70409feb3961dcec9c853c5fd96
SHA5129808b2c7feebed5377aa54768a9c57ef6163f53263952294160081cd766a4c3ec135dec66ce84dbe9421e2c719a01ebf82808987ace648f65f98b031c8b5ed58
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD52d7ed1fafde0cd35ec0d7f4909b6f965
SHA162eb5bdfc7db20b64e060a63fb9190e64f8c7676
SHA2568c24d83b263cc67be53e23b39d06d677cb551d7480dd75c88daf7349d20d85bf
SHA51208d19c6dc03b679b7c6b8907d05113849af17c273443e1ce178fcf4b49cce9cd337e5b87f3344e0ad0171f3fa86be1cd6e87de6b37df862575a967ace18c6f0a
-
Filesize
1KB
MD5292b81f60c570d4ddfe5e59f091a7702
SHA1665fca2df5b216e1c38b37703985d268529fbb6d
SHA256e517b3fc8ca19bb4e0d5305d151fb7887ac418d502a42b647bf3d4414120073b
SHA5129cdc5b7c7ffe71f683a7ee68c1db62f55db20906845e5791392a20b8812e7cea604e41a746dd0f623a47d7bab16e0ce7cefd4b1cc48610b2db72b87279dfd6c3
-
Filesize
356B
MD5388d90be95a0e7a7aaa63935d3a16ac2
SHA1affe1b0ca193078558c388d1f5835ca1a3f89c2c
SHA2567c6af573be6cd3fec23383f29188006528e277c3f58e174667326e0daf8c0038
SHA512cb1c33b52c81197275897009e12252bf3f37d3ab314bb623f8d484d94f767b9b4bb8d285aa5728d1a2341338ba58ec8722b306dd7643bee5eff29f6fa0c00d07
-
Filesize
1KB
MD505b4be4c9b2ce3357e1108a1d1f8a268
SHA1b6cc3fea664b252bfa7ab14cb54071a65e381f48
SHA2563c2688d1d7875c280151e1443399617e51b3d7ee2f0ad3fc9c312dd43dfcee18
SHA51260f259f398589afc9ceb7aa106a3d6df9eabeedab5f98a73e1d7a6ce251ccb7f9b0610e42870762a551db605ec8ac042b4c24605ae9ce842fc4af6f4816def97
-
Filesize
1KB
MD5c39d6c0972c655d8ac835aa63be92958
SHA1c604ea39ba3f0329e83b83d8c53516f655bf84e3
SHA2566292d62463f80444d63a2e62765b018f3c2dc5425765334316673017c438adda
SHA5125c7a73604e12ab129bd07102d226138849b1800fd479c15e0dc70ae9dd3b3a8ff56aceb231d1b3784547b69df8a4bd93a431de8f6657bd2665d7f73e48313690
-
Filesize
356B
MD58b179764cfd4753a44df56830263857e
SHA106a7023f0ded06fa109755b2bcd5626703195e3c
SHA25642bc978181ec84c670b52aabb9c1f6212151725fbd145cd75d975e398a5226f5
SHA5120370e0c702081bff900371624805bc2e33cbe787170d34843eb1dd949d8ec88510692d083caf87bebfc83f8202be8a6ae7631faf2c25857f9175ba58664ef4f6
-
Filesize
6KB
MD565e25981af4a83ed6e28353a0674f30e
SHA1856597d33b3316662036c9aa8aebe3bc1bae276e
SHA2564fc43dfb8cdf05a9f303efed69571883c0dff28a6594221035ba0becd4b1eb56
SHA51230b3e3c2de0a9886491a5804bc378696d65cd8973b3775cb5653cff0a58cbec5e1636ae3bba04cf5c1add615c34882ff02c1af2831ff519de4e7090f214f50e4
-
Filesize
7KB
MD5718ef8510404248f352a38ebc0c1d5d8
SHA1d698e4335ce050feb3d0718e4f62add109986bc0
SHA25656c8af480a1a101d750ae29f40e4a9270a294e353f6c8d98f50a4165ad660cb6
SHA512dcfbf3c16f234db426af4a37763cff16cce47a438f872e501c7e5783eb89970fe8a738d63864d0dd5f52748afae8c49dd68784fe82579ccbf7d6332895b64250
-
Filesize
7KB
MD5f339b48e3088c1c6be5e93bf889afd23
SHA1bf65bac702a9c283c986489d1a93af8f12c9d09a
SHA25682a4c65c7969bb91529f46370ec4051273f4b03a719f2143264edcaeadf2eb07
SHA512596cf7c0cb28d578767c021d9865b6917caac4bf05aa912ca55c7a1da9d1e415cc1552fc02b9cdfbcd41945325a4c6b654f4554c270e946b1fb6769d41117170
-
Filesize
7KB
MD5421512455058f6efc78e08f1ef5bc0a0
SHA191973ac881061e75b75ac048e5705a656afedf3b
SHA2560f4427195a4da97b2c9235269fd7b4ccd28250b58615f32970e8da0d6d29d8c1
SHA5129a9ac8d14334520c0caa11fa5d7b51b9ff00f06f3c8e0557ae9ff5ec2cd018d6803cf17760e55ee25ff84e8c79c7b6b6294ab15484addeb5a2c9e07b10d4e77e
-
Filesize
257KB
MD5a9047279272536126a9196962aaff510
SHA1c1cd7230e43de99ec4bdfd63bab873ed56041b06
SHA256540b13224312375547c02b9c23e829a0dd154a82ebf21768cb630767d8cf986d
SHA5129ddb674d2c9dbb1d3ffbff6dbc484019c3a4efda6ceb4a2408b50f2aa818306308465eef8beb04b563d592e5f424dfd48a98c5570053b76520750d2b2e5b6ade
-
Filesize
257KB
MD50955f8091a638d46d9ccace0307c6aa7
SHA16aab34a8df33ab8e9c879a75b39437388226a1bd
SHA25655bd60e1f35fd229eac7fd203398623c74aabc66aa53ff2a48114ffe48fd7146
SHA512b69d29c4ea10c4dacca54addfdeea89a4dbf08a4a2a3343adeaec62b788fac99bb240febd6a8eb1f8b2d412a0a1b2ad54b1aad2a7b2df043644fcfbe16e2a8df
-
Filesize
277KB
MD5e50fae580d5af080d550c51e7719307e
SHA134ac3dcae21c77c011187eb6c1c206ca2f775ef1
SHA256422bee2f469b9298208a10b36a290f06a0feb4cdb12370cdc4f37b57c219c84e
SHA5125051e3f01a3e206e619fa30fd14bb01ed081d1a062acf945dbddfef84f5eef4119fead5fa72b7289100023be62d35f4a6efb3bc06db88bd0e8b2a83e9d34229e
-
Filesize
257KB
MD5a6a44d5f4ea6961c98cae382db629acb
SHA1bd7906e8792aed064d5f5df98661afea4d3f3cb3
SHA256a54558b0671e0f5afa97f8f1ea9e93fea180c5e7e6f0a873c5e64e349ba3d028
SHA512b537d46cc4e78f1bc43db33048cb49ef3f8a6092d5d958cbee4969128bd249f1c297d790a98dbdabd3317789a1de451be760e8e5ba56aca2dc730076bca050e0
-
Filesize
257KB
MD5e4d5c0b48aac68699c240508581bf10d
SHA19fd1af491f5f10bef27c29899d29c9b6e8035bd8
SHA25668731c9b6c8305af7cfb8a3636d10092863cf494878443407857fa50e33d83c2
SHA5120d9de7db1f0dc952475f548a8f30832b74b1d7e9784a1b9dc6057eeaaeb1f37550781824364bfafdc5b7f30ba5fcb11c03938ffd170a954d660ee29b296bcfb7
-
Filesize
91KB
MD5c4c388c2a9346153b5bdcedccbd3d555
SHA179ccaa051c739fa43d8a3ffc6a651d66667bcc5a
SHA2566f915efc3e9bc4729f8e78091cab6940594e24821972693be6333ca214db9066
SHA512fcda680cf82d846eeca11d7a7c9d8fffd4bac86a2d8b2ab7da0b8f3c25a6b18c872fededefea8a5360656ae09132766456af2541ead857bddecd9f1667a0b8a1
-
Filesize
104KB
MD54ab14aa086f264db0fa0d0edc4f1f089
SHA150618b071570d73f0c194556d5edf563b8704ae8
SHA256c62d4f4c39d7ea9e87e0577f4dbc2c2809da00658fd03b30a109a59d5530f7e7
SHA51253c727ba3d35f70e57bc276cfc12ed8720df68de675cab58f0cdc11e426ef3806d6baf4efbab015939c1472c6461a975f9ea11d0a1363342f84bdaf2422f8aae
-
Filesize
88KB
MD585efd9263c524aa0c8bbcdcbb5f5e919
SHA176007b645e06db9074cb69b16b5034b60d4c37cf
SHA2567958263c3ce0a471a6f22479047fd2ec0933fcd133c0f350e35014f4082622cf
SHA5120d1108dbd6af99e230aaf630ade5192ca08e8b53b74f5b76635817401040f90c03ea394eb5bc88f9208acb76790035016bb8e1744a40d44f2821f8b35a0c8e44
-
Filesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81
-
Filesize
352B
MD53b8696ecbb737aad2a763c4eaf62c247
SHA14a2d7a2d61d3f4c414b4e5d2933cd404b8f126e5
SHA256ce95f7eea8b303bc23cfd6e41748ad4e7b5e0f0f1d3bdf390eadb1e354915569
SHA512713d9697b892b9dd892537e8a01eab8d0265ebf64867c8beecf7a744321257c2a5c11d4de18fcb486bb69f199422ce3cab8b6afdbe880481c47b06ba8f335beb
-
Filesize
143KB
MD58b1c352450e480d9320fce5e6f2c8713
SHA1d6bd88bf33de7c5d4e68b233c37cc1540c97bd3a
SHA2562c343174231b55e463ca044d19d47bd5842793c15954583eb340bfd95628516e
SHA5122d8e43b1021da08ed1bf5aff110159e6bc10478102c024371302ccfce595e77fd76794658617b5b52f9a50190db250c1ba486d247d9cd69e4732a768edbb4cbc
-
Filesize
381KB
MD535a27d088cd5be278629fae37d464182
SHA1d5a291fadead1f2a0cf35082012fe6f4bf22a3ab
SHA2564a75f2db1dbd3c1218bb9994b7e1c690c4edd4e0c1a675de8d2a127611173e69
SHA512eb0be3026321864bd5bcf53b88dc951711d8c0b4bcbd46800b90ca5116a56dba22452530e29f3ccbbcc43d943bdefc8ed8ca2d31ba2e7e5f0e594f74adba4ab5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e