Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/12/2024, 19:50
241206-ykaksszqap 706/12/2024, 19:45
241206-ygwc4atpav 624/06/2024, 15:32
240624-sysewazamg 1024/06/2024, 15:21
240624-srlnrayfne 1024/06/2024, 15:11
240624-skk4msydkd 724/06/2024, 15:02
240624-senmksyaqc 128/05/2024, 18:25
240528-w2xqjsgb84 828/05/2024, 17:33
240528-v4xynadd51 7Analysis
-
max time kernel
989s -
max time network
985s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 17:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b00000001da34-361.dat aspack_v212_v242 -
Executes dropped EXE 12 IoCs
pid Process 724 [email protected] 428 [email protected] 1556 [email protected] 1496 [email protected] 4724 [email protected] 4612 [email protected] 496 [email protected] 3008 [email protected] 5044 [email protected] 1444 [email protected] 492 [email protected] 3804 [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 21 camo.githubusercontent.com 70 raw.githubusercontent.com 71 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613912170504624" chrome.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Documents" [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU [email protected] Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 [email protected] Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656} [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 [email protected] Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 [email protected] Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" [email protected] Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell [email protected] Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" [email protected] -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 736 7zFM.exe 4032 7zG.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeCreatePagefilePrivilege 2252 chrome.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 736 7zFM.exe 3384 7zG.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 3412 7zG.exe 428 [email protected] 428 [email protected] 428 [email protected] 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 4032 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 724 [email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1448 2252 chrome.exe 82 PID 2252 wrote to memory of 1448 2252 chrome.exe 82 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 3844 2252 chrome.exe 84 PID 2252 wrote to memory of 4364 2252 chrome.exe 85 PID 2252 wrote to memory of 4364 2252 chrome.exe 85 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86 PID 2252 wrote to memory of 3788 2252 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba79ab58,0x7ffdba79ab68,0x7ffdba79ab782⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:22⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1640 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1868,i,10042104780269269689,5704886758063939379,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4144
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4740
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:736 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\Launcher\" -ad -an -ai#7zMap28657:78:7zEvent274852⤵
- Suspicious use of FindShellTrayWindow
PID:3384
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\Hydra\" -ad -an -ai#7zMap3868:72:7zEvent260902⤵
- Suspicious use of FindShellTrayWindow
PID:3412
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\Time\" -ad -an -ai#7zMap20953:70:7zEvent212562⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4032
-
-
C:\Users\Admin\Documents\Launcher\[email protected]"C:\Users\Admin\Documents\Launcher\[email protected]"1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:724
-
C:\Users\Admin\Documents\Hydra\[email protected]"C:\Users\Admin\Documents\Hydra\[email protected]"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:428
-
C:\Users\Admin\Desktop\Time\[email protected]PID:1556
-
C:\Users\Admin\Desktop\Time\[email protected]PID:1496
-
C:\Users\Admin\Desktop\Time\[email protected]PID:4724
-
C:\Users\Admin\Desktop\Time\[email protected]PID:4612
-
C:\Users\Admin\Desktop\Time\[email protected]PID:496
-
C:\Users\Admin\Desktop\Time\[email protected]PID:3008
-
C:\Users\Admin\Desktop\Time\[email protected]PID:5044
-
C:\Users\Admin\Desktop\Time\[email protected]PID:1444
-
C:\Users\Admin\Desktop\Time\[email protected]PID:492
-
C:\Users\Admin\Desktop\Time\[email protected]PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fd08ab33089893fa6dd4d1111ee0d9fd
SHA15a67f0d8a2e067b90026f26faf9d1534d5c3d6b0
SHA25674634c62e1ddda06458aa0d3a1868873359a7059722c1b62c0d4298f6ce85c9b
SHA512f651a80c0f8336d4e77235b90ca28468a59ff288b607b60b5c766c5295c7034aba229a61db33f838e51371201fd6029419a2d87ca5a7dd51280ed2d477dc2151
-
Filesize
2KB
MD5d1bb7e8a63f684028e3c2824013ee8aa
SHA1a77041aa3742c0481a18ad6dd6bb691919d038a7
SHA25621bc4b67a70f893f75986b76464df8f91499bc029461381f7345564c2324a9f8
SHA512ea2ad1c3105f7473a4057e5fe57320e279488374e4671d460e47474805dca5d7b4053b5a154320f0ff0f22c791d268e3627ed2e80bd3568f9c8f3ac59986f87f
-
Filesize
1KB
MD53715a673f80c735b49a9029006320a85
SHA1eb1c8c84a4e57f89ed4cb2bc3eca21fce76b5eb5
SHA25602662e2ec0e3f9e5a4d210dd8e182fbb7b3054008a8ee2583b68a4fc802b5313
SHA512f9b6c6ce88dcbf4cd21991491c4bb6ea4f7f8775876d88d39fffad326c23bc5912ed8ea9f4b9fa1a10bd42492893ee63ce1547022272feafad77c5fee72acae9
-
Filesize
1KB
MD528a5f980387f601c37198c9988237e84
SHA153ad56bae1a853375d21504aa269c0f249efa0d2
SHA25627c3fb1f0478e9587985d34a9068b210d816c0878b1c1ac53d294d454f0e6769
SHA512ba96b1375ef66ea5f541aaa6e672be1ba45b026c4acf443c27b3a077801ae9bc72e94b4b03a81bdcf87262e0b6580997e9e410881168f798d389505141ae9099
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5cfff9d231eddda6675d5daf57d3a8940
SHA16422e2fd3fe3f3c4f5ae539f57c9577b4eed8577
SHA25677aabcfcfedc16c0e52ba98d564ba1fc17c4bd33677cf229865563db659bc841
SHA5125033290196b2b9544c9bdd24e715863d5912399f3f3cf6de62e74e9da46778b343426972c78a974723a43e804e79a80989eb93ec91e8b398c171d5d6eec7f7cd
-
Filesize
1KB
MD5a5c8f3b7d38105dd3370550cca62303b
SHA1ba0a56484ee82fcb7ca0f26b9bd795b2ee7e2981
SHA256682e17623c6e135de201ae205c0fbad294ff05277c1b6c9da31b22792d7be89b
SHA5129822ba9ab0b77377482c49ec1981fbf3c4d6307e04bb5aa9c62d2ec89641f94d83bc11625fdb1b0aad88a74c06ce3da1d12f05745499fcbaffe06d7d66b63e01
-
Filesize
1KB
MD57463b6f7aa08864be4c62d9cd03a8e4d
SHA1be7a65e79368c121c7904568c71bea5f1d0ee9e7
SHA2564ba95589db462dca5bfd170e4ac03c1c9fc17eca5750955a544e184a16ca7d38
SHA512db77c758901c1e62b2e366141fb86598d2a65fb3e8c4817bc63f33ac952f88caf2106d8c481f97b07e02862ee69a8cb77cda8d3a24da56137b9e8572313a2108
-
Filesize
1KB
MD5c6e4779211a7eab4982d8907b3321e0a
SHA1a12b4d1b807bbe01b5cd908057075ca17e6a7438
SHA2565533512d28b015f37fffd89c55746e21f0627d6c0896769529c41a698e3c1adb
SHA5129d6055d8c49605b57ab9548bea9b241a1ebbb4430c52e9223ee8b1dbc01b05758a3df3d836f74e0ac9ff9fbfb6cee3d7284b5265546c4793b74e3fe6ee7f579b
-
Filesize
1KB
MD5999c03bc36155597437ce9f164ac701c
SHA1b97bd70d9d0ccd5916856a4b918bee4473dabebf
SHA2560e4f292704faff9d3ca5b5a86d10a24d87c6fafa2a41f12b1f580dff2f9454a8
SHA512a4abefbdbb02342965c4223b6eaf54adeec334648bbcf2dbdc8b8d2f41cc60b929639d608ef35dff1b898973691246e413b5ca1e4d6afef58e8276bd8dc609ac
-
Filesize
1KB
MD53a27c474bab4f8e354b8ff9056fcfc9f
SHA18ee83ef419851279f4718dd20bc08b696011510a
SHA2568ef91aa665ab79c805f92bf2a417b83332eeecb1783fb84e72254eac96107f15
SHA512c42deff3cdb6ba6eed49e416f4c51539632917607d93727bfb127571df5af20854fd0b3540ae11ec6b3f86f6774a8b8c3c6271148719cf40c2ed531917125f4a
-
Filesize
1KB
MD535a445c2f4ddc0a92fe51a3526f100c0
SHA14c43a2da803ebb719d8aaddc4388ba27b5ccf489
SHA256b8c1fed0878c0c5d85e4677d5cb54a383d5a266fd56d05277da8096ccc2eeeb8
SHA512ad780c6cba1bafd93071493a8dfcaf05b206fabfc4ef82af1592af3e573c325beec6f99de882c33c11a1a6a6c145400e6a054b99c4a6917b9476c7971d529d01
-
Filesize
1KB
MD56e835aa329f360152f55606064ef9fcf
SHA15d5a94450d456e05e35142eea0e8354b46c597b4
SHA2560d917bd6769d07dd321ad0e691e66cca61ad0f5eb03fc37a69fe74e9f4ae6341
SHA512d7cbc4114e5cd4e4453adbfe2b5958d5664e533fb03213db3497dfa81090227a93717a34919b1776b5df81ae3629606524a414cc7c1dae960ffc58a3b247082c
-
Filesize
1KB
MD5554b4959bb6c881cc6043e74341a6106
SHA159a733befbbd418acde7799649543df261e7563b
SHA2564c43f741e130bb535f7b32c2383b5beb4b9bd29d010a3657e87ea323099b1397
SHA51295a6de93decd9f4eb2de0e2c2a42c93d24b13c3d5acf54e923d60570f08fe232177ef60c6f5d4ba6f5fa66525a46ce67b7645a48c814f825f4867acb77cb8951
-
Filesize
1KB
MD58172da0b67ef53d14e59e2355271d16f
SHA1636d97b71dc8dfe80fe04d1b33787259e32715d6
SHA2565732bf53116b4706f5c4a9b4272c6dac05a1d41153434ed48457e563c69fd9fb
SHA512bbe2520e41a05d9c15d5c554529f6845ed4279b2c1e43453543850065bd1d567b249f2d87997726d99f4a24c935c6b380eefdaaef97ab1fca15601454f01ee46
-
Filesize
1KB
MD582de38202d4c89ab77cf79ca4607a0b5
SHA1fe3fc9eb94720a66398cd2d9275a4d2725b4fc58
SHA256e3d7adde1db60100643630d1caedf08e62878ad749466959677c178bd073927a
SHA512ef35d0b0f3f68ab0715dfc0899de90aa8206f9c658a30c9b8f6cd79e589197a0118d8e0caf802059890cb0fdb691093282f6ba5a8093d1574c93f5d1bfd033bc
-
Filesize
1KB
MD51d44814c9ebd1286e4c89b124e788c87
SHA1efd5581b7d85305edee8ecd60078bccc1b0539b7
SHA256a7c65377bf3e82f36947fa6ff5a1a0883713f10487f40b8525a7422bca9cb1f5
SHA5127dee5d067dbfdfb04310188f42e4231e9cdb9e63a034348f5669851a227975b93f0fe4b94efe59dc1c67cf4c357c243d27b63465ac62c0d44e505f7c197b56a3
-
Filesize
7KB
MD58bac40d8a24a39d4e2cf5316f99747b4
SHA138e149195afefbf76e5ca5dfc3efa17c5f8a33f6
SHA2568c345376a74a29a66db24d821dd40d219797d4250a361c5394d4e00b42f34865
SHA512f5bcdf73142564a7959403043e0107969f74ef3855eef21d281a3a93e265d4d0c0778bdda4f0d3997723e3afa1061604e00ded2e43c53c407c6de1e0ba13617e
-
Filesize
7KB
MD53e46b21b25548b63b600a39bed649e43
SHA1031bdd2e6d2a93c551553f9fc1db95a948bddcd7
SHA2569df0e0db9efb87378cf1c214870cbe482bd4fcff6a5f8e2ecbe24a7949b59ab1
SHA5129164394243e48ce30b04990da20525fe433ebb7b0dd0b05492b0e2ef5197f8819275a6e690fcfbf90dd07ed3d433b9d888191dbf587f74a69f099e3cee2b2967
-
Filesize
7KB
MD56eab7533eef9a557c1ee8aa07b5d3669
SHA10776a50f1044250167b04cee7fa2a66b173201a5
SHA2560f357932378152eb39fef0b40d6e3ca9386d111bb48cd6bcb6bfeb4ec875aa98
SHA5121d1c195c86a74527dd951b9b0a53633195bf39c87872110b32c5472f6a6fa269c15a2f62f710d140a5af9d7ee20a7c36e58a2185558e1f7f810d1c0f0907b197
-
Filesize
7KB
MD551fffce30d893328a3e46b5686e67270
SHA10992c0fa117b886a70fdfb363f252f0ab29cfc7c
SHA256bf38092b0950f9ab7fd733b50c57a6e61f3f2337033ea97358a91ae61b7884bf
SHA51216db82747ca5e7d8266e8dae8407fd25875856887064c33bc9631475455de62e4cc6a5e987677f6852057d516a9c2df002cb56c4e75218b49d989e5b5d163b54
-
Filesize
7KB
MD59f48cc3f7151b0a7100071792f9de493
SHA1c653e47cf04a86aa102218e9eaa10189f612cbfb
SHA2561e8d5e7806455557b1a992a330876aff753d10b700b2448a40186b960da67d47
SHA512210031d54a8a92df0afe13887766e88ce1d92bb4108e6b9505a926823e8e71ba8a112656810ffdf6813530ad93ff1f1ee0cbeab25cd5dc30a50d4c59d5c70b73
-
Filesize
7KB
MD5cd542176b321c261b8518809f67b73de
SHA14bc0525abd3da2ff36c088196c51a1ccb5b71870
SHA2562c1c078e946291d94f5eec06770f9a1171bcf25b59139a2f75441338892ca0ce
SHA512c0a0002999c89fb9f39165442aac65698b61935e15fd1a675d37687052aa199cafe57335ede55ee656635f7d241c99679027bdc7311b7623ab40e02bf14833a6
-
Filesize
130KB
MD52a387be308765fb97c416f2356576fa6
SHA14f8d34c85c7db66ae3c0a6d5ba0efabf514e1fd5
SHA25642191a70d2e6cced9bc4bc47a1cfaad4d10254442a79979eab96cb72bb9e0fc4
SHA512e50fdf729a758933a3ae6106ed2cffdf6465f3f89ccc50fa09ee95487304aae2f079d1457d5bf08dae2c847eaad62795faacbdd6d814a58062151fbb968dcf04
-
Filesize
98KB
MD5857cc72cb8f1eeaf8587801ee373a9d0
SHA13e8e550ff3cc0b35e08d910685b70fedf841de22
SHA2566e7db19d04998cdc56a957bb25ac9b5025b6203ebc776a7ae6c2336e1421e4c4
SHA5127ada87169f0db448057fbcfefa9721e8ca044d859739360f7851d8cbc75660a48926d7169be90b21f26fa3b6af6158e1e8c52836a80ec695bbc7ec04f65c28f6
-
Filesize
94KB
MD54b90c9bc4253d1a2460343598fadbcf9
SHA1c4d3ef74f1aef4c892268293e5630e8691dbbb9e
SHA256c3686723d17a09a837c7327117aa3cb12e5b1c3a230d90173c74eec07b135fd2
SHA512b312474b4df1347a2ece3df95713f33d433631a4a522291dafad83a3d2f891db5c05417efe2c59c71dd7a20063b6a47fe7733125df581bbc357b1e4873e99009
-
Filesize
88KB
MD572a5f856f15c0dc23a96cdc9dd06864d
SHA1956a98180645ded451ccf63d4892d91638f98f11
SHA256f8c28d0a1bd13072c43965d1c8978cae80b50ce0c5685aae52614bc307a88595
SHA512ab535c8fad294cf9c382684518edc5790b0a45958d99713d8486119362f8fb89928e8305829c5ef4a3abfee12cdcc24699e88012c8b03db0eb9cc09c12808abf
-
C:\Users\Admin\Desktop\Time\[email protected]
Filesize111KB
MD59d0d2fcb45b1ff9555711b47e0cd65e5
SHA1958f29a99cbb135c92c5d1cdffb9462be35ee9fd
SHA256dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993
SHA5128fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9
-
Filesize
11KB
MD5357593a30fbf34ce95d7db2a5e71d90a
SHA1153d3e93b95fecf22b9660660d376b0bde042140
SHA25675f0265017e4c7d6df8a9087af92ca3e8f742a4b19ce5539e25f95316f925275
SHA5128e96b7803d11b5a567361be18d24cff46c2e908202c067ac6f25b809589884abc327cecde7a46a0867a2b26888e9b2edce1466e20a5136272883bb60ac245cc1
-
C:\Users\Admin\Documents\Hydra\[email protected]
Filesize43KB
MD5b2eca909a91e1946457a0b36eaf90930
SHA13200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA2560b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf
-
C:\Users\Admin\Documents\Launcher\[email protected]
Filesize197KB
MD57506eb94c661522aff09a5c96d6f182b
SHA1329bbdb1f877942d55b53b1d48db56a458eb2310
SHA256d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c
SHA512d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070
-
Filesize
189KB
MD52c3ad97f5d5314dc0be1c7859c300b8c
SHA100eb5237723cf6bef658e9bef0c5a466067fe67c
SHA256291146daa2d2c2c07a299f0e5f3bf6c6d84dbd4b6ab88dfb8024ab7541a1a382
SHA5128f5073f2f601c8ae9e0f01130ab9d9be1d6793f58905c15be99164e855150abf19fb19123faf0019ea1bb52b3acde2ea4d5d8c38c85481f5a040a3727104d23a
-
Filesize
104KB
MD59418544d8cf5e54f71381e0cbbf71f90
SHA1765b2b506571eebb0c7057f8eae4df19a02df227
SHA25697b8f7fe0101acc64e962067791943fc8182aca1a692b18b88247d984212c513
SHA512656e3cf0143e81350914d3211db4f5a7a1071efd960b4757da7ce2f9f106344fc741fd9f76443e12803a01e5910eabb5e7c8c03267bd9b4866c4ee0bded736a1