Overview
overview
10Static
static
31408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...VR.exe
windows7-x64
31408_cn_V8...VR.exe
windows10-2004-x64
101408_cn_V8...lt.htm
windows7-x64
71408_cn_V8...lt.htm
windows10-2004-x64
11408_cn_V8...de.exe
windows7-x64
31408_cn_V8...de.exe
windows10-2004-x64
31408_cn_V8...ew.dll
windows7-x64
11408_cn_V8...ew.dll
windows10-2004-x64
11408_cn_V8...ew.exe
windows7-x64
31408_cn_V8...ew.exe
windows10-2004-x64
101408_cn_V8...rs.exe
windows7-x64
31408_cn_V8...rs.exe
windows10-2004-x64
101408_cn_V8...up.exe
windows7-x64
31408_cn_V8...up.exe
windows10-2004-x64
101408_cn_V8...20.sys
windows7-x64
11408_cn_V8...20.sys
windows10-2004-x64
11408_cn_V8...oo.exe
windows7-x64
31408_cn_V8...oo.exe
windows10-2004-x64
101408_cn_V8...lp.chm
windows7-x64
11408_cn_V8...lp.chm
windows10-2004-x64
11408_cn_V8...er.exe
windows7-x64
11408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...��.doc
windows7-x64
41408_cn_V8...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win10v2004-20240508-en
General
-
Target
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
-
Size
304KB
-
MD5
59555007edc2e58f84e02403b6524131
-
SHA1
094aa76912fd62b3098617ed988c8b47529d1ebf
-
SHA256
33fb93fce6f3e077a1bd82913cdbd14b50de9e5435db1aa2ecf344bd031ff5e4
-
SHA512
522860b2cdfc1f5a2b38cfd5508d85557948bfc8762e302027b329bab49fc4b568b27d0cc5118bfd54ac60cdb3cd80545eb06e15ecaae93eeb55864e49cdf95f
-
SSDEEP
3072:k/jazHf6wLjEVcatttttttnz/yikU+XNYvfxc+6o45qIQopTqJpmIA2ca2nBEx82:k/jMSSIz9f+XNOJLv45xRPETGjU78Eb
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Processes:
foo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" foo.exe -
Processes:
foo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" foo.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
foo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" foo.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 404 netsh.exe -
Processes:
resource yara_rule behavioral22/memory/536-2-0x0000000002430000-0x0000000003463000-memory.dmp upx behavioral22/memory/536-6-0x0000000002430000-0x0000000003463000-memory.dmp upx behavioral22/memory/536-9-0x0000000002430000-0x0000000003463000-memory.dmp upx behavioral22/memory/536-15-0x0000000002430000-0x0000000003463000-memory.dmp upx behavioral22/memory/536-17-0x0000000002430000-0x0000000003463000-memory.dmp upx -
Processes:
foo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" foo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" foo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" foo.exe -
Processes:
foo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" foo.exe -
Drops file in Windows directory 1 IoCs
Processes:
foo.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI foo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
foo.exepid process 536 foo.exe 536 foo.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
foo.exedescription pid process Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe Token: SeDebugPrivilege 536 foo.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
foo.exedescription pid process target process PID 536 wrote to memory of 784 536 foo.exe fontdrvhost.exe PID 536 wrote to memory of 792 536 foo.exe fontdrvhost.exe PID 536 wrote to memory of 388 536 foo.exe dwm.exe PID 536 wrote to memory of 404 536 foo.exe netsh.exe PID 536 wrote to memory of 404 536 foo.exe netsh.exe PID 536 wrote to memory of 404 536 foo.exe netsh.exe PID 536 wrote to memory of 2808 536 foo.exe sihost.exe PID 536 wrote to memory of 2848 536 foo.exe svchost.exe PID 536 wrote to memory of 2952 536 foo.exe taskhostw.exe PID 536 wrote to memory of 3372 536 foo.exe Explorer.EXE PID 536 wrote to memory of 3564 536 foo.exe svchost.exe PID 536 wrote to memory of 3756 536 foo.exe DllHost.exe PID 536 wrote to memory of 3880 536 foo.exe StartMenuExperienceHost.exe PID 536 wrote to memory of 3972 536 foo.exe RuntimeBroker.exe PID 536 wrote to memory of 4056 536 foo.exe SearchApp.exe PID 536 wrote to memory of 4108 536 foo.exe RuntimeBroker.exe PID 536 wrote to memory of 4800 536 foo.exe RuntimeBroker.exe PID 536 wrote to memory of 2272 536 foo.exe TextInputHost.exe PID 536 wrote to memory of 3848 536 foo.exe msedge.exe PID 536 wrote to memory of 1292 536 foo.exe msedge.exe PID 536 wrote to memory of 3312 536 foo.exe msedge.exe PID 536 wrote to memory of 3112 536 foo.exe msedge.exe PID 536 wrote to memory of 3428 536 foo.exe msedge.exe PID 536 wrote to memory of 4128 536 foo.exe msedge.exe PID 536 wrote to memory of 3892 536 foo.exe msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
foo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" foo.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:388
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2848
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2952
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\foo.exe"C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\foo.exe"2⤵
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:536 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3564
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3756
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3880
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3972
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4800
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:3848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x23c,0x240,0x244,0x238,0x214,0x7ff825262e98,0x7ff825262ea4,0x7ff825262eb02⤵PID:1292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2740 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:22⤵PID:3312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2800 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:32⤵PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:82⤵PID:3428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:12⤵PID:4128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5544 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:12⤵PID:3892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5000 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:82⤵PID:3864
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d0 0x2f81⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1