Analysis
-
max time kernel
49s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 09:03
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20240215-en
General
-
Target
123.exe
-
Size
397KB
-
MD5
efe9258e0c5211b5cad48a66cad1ecd2
-
SHA1
adf19cdb6795b50500429b0ff59d12cea477966f
-
SHA256
9da9b6fa70e7983ccfb4a915fab3d111c52e6aa4f7b8ddf43585e1957ea55060
-
SHA512
af6fe0787bae4722043c997ba5d871426adaed6fbc95fe53acb28e6ed75677d6ca2d27f5a81a53e9061c6f658a28f400743c5e1673898147bf5af2f1a4b51d92
-
SSDEEP
6144:MLy84u9nSO2GjZkD10BIY3rb1YfBdfpoZ3u/Ht52w6JSeiFPXm87:Y+u9nx2GjMY3XKfd/H/9Pj7
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-1-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
123.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\123.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\123.exe" 123.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
123.exepid process 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe 2220 123.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2588 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exeexplorer.exechrome.exedescription pid process Token: SeShutdownPrivilege 2664 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2588 explorer.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe Token: SeShutdownPrivilege 2364 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
explorer.exechrome.exepid process 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2588 explorer.exe 2588 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exechrome.exepid process 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
123.exeexplorer.exechrome.exedescription pid process target process PID 2220 wrote to memory of 2588 2220 123.exe explorer.exe PID 2220 wrote to memory of 2588 2220 123.exe explorer.exe PID 2220 wrote to memory of 2588 2220 123.exe explorer.exe PID 2220 wrote to memory of 2588 2220 123.exe explorer.exe PID 2588 wrote to memory of 2364 2588 explorer.exe chrome.exe PID 2588 wrote to memory of 2364 2588 explorer.exe chrome.exe PID 2588 wrote to memory of 2364 2588 explorer.exe chrome.exe PID 2364 wrote to memory of 2624 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2624 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2624 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1860 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1280 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1280 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 1280 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe PID 2364 wrote to memory of 2320 2364 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4e29758,0x7fef4e29768,0x7fef4e297784⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3404 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3728 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2444 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3748 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3716 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2608 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3688 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3836 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3768 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2096 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3760 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4132 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4196 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4364 --field-trial-handle=1312,i,17709900695045286787,18268627805369256212,131072 /prefetch:84⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.0.395115462\1316553962" -parentBuildID 20221007134813 -prefsHandle 1228 -prefMapHandle 1220 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ae874b3-226c-40fc-a103-3aa69fa3f56f} 384 "\\.\pipe\gecko-crash-server-pipe.384" 1292 119f2b58 gpu5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.1.964209181\1243134384" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 20830 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7e4707a-2a8f-4500-b4b4-69b670618914} 384 "\\.\pipe\gecko-crash-server-pipe.384" 1496 d72558 socket5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.2.1280482046\737192144" -childID 1 -isForBrowser -prefsHandle 2080 -prefMapHandle 2096 -prefsLen 20933 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71c2f387-8271-40bb-9fb1-133ccc10109f} 384 "\\.\pipe\gecko-crash-server-pipe.384" 2072 19d9d058 tab5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.3.921261750\637117027" -childID 2 -isForBrowser -prefsHandle 552 -prefMapHandle 1640 -prefsLen 26111 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d0dda62-02ca-4bc5-8abc-a03fc7bfd6b0} 384 "\\.\pipe\gecko-crash-server-pipe.384" 2436 d67558 tab5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.4.1419199764\8014133" -childID 3 -isForBrowser -prefsHandle 2876 -prefMapHandle 2872 -prefsLen 26111 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e88e80d7-20db-4499-a7f7-79e7030a4651} 384 "\\.\pipe\gecko-crash-server-pipe.384" 2888 1bad1558 tab5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.5.892737490\2083510121" -childID 4 -isForBrowser -prefsHandle 3744 -prefMapHandle 3640 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {114a608a-e8a0-4e07-bab8-930d7513ea39} 384 "\\.\pipe\gecko-crash-server-pipe.384" 3788 1eccc258 tab5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.6.266339307\1368077386" -childID 5 -isForBrowser -prefsHandle 3788 -prefMapHandle 3904 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {35f127b1-84af-427c-b9cc-d04b3e95477d} 384 "\\.\pipe\gecko-crash-server-pipe.384" 3892 1ecfd058 tab5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="384.7.391178718\715487245" -childID 6 -isForBrowser -prefsHandle 4100 -prefMapHandle 4152 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c04c76c7-c9a8-4682-b9d7-7a74192a4344} 384 "\\.\pipe\gecko-crash-server-pipe.384" 4132 1eccec58 tab5⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\01f0264b-1464-4d7a-b268-350ee2a062b7.tmpFilesize
271KB
MD5b232b06b813846feccd078ac47414565
SHA1892bec4f8d93bfe69d3b611563f1951953482159
SHA25664e96740ae0721d536c03589d4eb47ff6c92d19ba867ccc8c85f30c045948a11
SHA512b42b542c455def433246e62930827bc943dac3fd311ebe495dca800d74b9bd56f6e5ece3c76c1ff003a31ef742024b873dbcc68de2105558e633a52fd7ff8a15
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002Filesize
59KB
MD533d2dcc9ccf87d6ed728ab0c46235369
SHA1249e080a07601d8537b242546067229f49a4aca1
SHA256a455f1cebb519dc1861af1646224fb2cff08843469c0f346d93efb6745615c4c
SHA512754e230d5ed0a578559702f43312b2cb2b282676a95218ec3213efb566fed6ca02034bc6dc7ba124afee6f9b766a0680a8e51ea377b998eb2a10d0b7de67f7cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmpFilesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
852B
MD577705c73c89539f47b6b4cd2857887d9
SHA1573ab16e509479da0b1c514511bab52c7dcfdf2b
SHA256e5a498b8a65ddec126cea01ce05b2ef8504442044be23744be523e6e3abf98e1
SHA512784c8750a780dfc779e32a2df61266a8fd3efd677fe7450c6f6d171864c4e305bb5430d176c757d4c28eb5c9d11ee9dea47f77c27c70a8a59ab561df46db19ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1016B
MD5313bf5469807dd715009ed6c50015dd4
SHA13ec883f4080f84503abbb36deb7195effc068c77
SHA2565ab79344f67e4471cd0a8633dff7aaa9ed21553a96fe71a3ed59dfa71f60c49b
SHA5125e7a6433a4e7c385d1b93e5b60d92ab9881b73f2ff15bad78f0c93313ec76bf0a6df271a63f6b93ccfb264a447b786434a868bca6635b5431c43ca2f751d705b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
363B
MD5c681573708a66500b4f176451f2bcf4a
SHA11f6174e46decdf51ff3449c93f410994194f3b82
SHA256dbedbfffc0273396562611fdd4ffd14c6fa6c48b2cf478d62f5669cd2919bf5d
SHA5126fdd98a4f93e7a256a30ef3aa8c21467964ad9c6d10b5a4b35ff35cb96d2464f95f50e1f24bd6d51388de5339869df35f57e6d00933e78f2e6594e758ef8dc61
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD531863f245cdcfd13fb88bb8ddcf09117
SHA16e6aa64199e84129a4bfeb01428c809dff2afbb2
SHA2569511a4f97cd1d1f4bd0cb05a71bb25bf7173f37c55a07b74c4278aaa1c33fe19
SHA5120af43b508a0a4e2750effb527e01bd977d390871bb67d42bcaf0960d2b545ef2e9a7146e4baf877b737685c6649e9ee7da0607b2cb53e78adfc5bbf48f3ae2fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD59814ed50f65c35d30a088fbea75bb569
SHA17fa07c741a532c76b6d1ce104111686df66923ae
SHA256e7292b41871892dd882ac6b7c205efaf9e796ab17cf5078f72f0748ceee12f5e
SHA512011d55fdd41b7a112dc0fcf91acb9c2eba07048f9bfa8ca6ba88bb1db4b7d412368135633bc0b8fdd710bef86b0148fa67ad87f40518d2c550dde80c63f18b89
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
271KB
MD5952c2bdd28251071c67572892fda45d7
SHA16a94dba981c1123098b11925d271db492dc18f3e
SHA256c00643a0d095cf8bc2187af742614e4d469172fe8e207b25df28169ced2661c2
SHA512c4159c5ffd6573044a709d99c1f9d1d89b078e1c6bbd41fbd23ff7c3a8c03081aac9dc9f264a4574008745460d0d71ddd7c88ae43451e90bc51e011563622d3f
-
C:\Users\Admin\AppData\Local\Temp\TarE029.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\datareporting\glean\db\data.safe.binFilesize
2KB
MD5c24fa93ffc516a2dcade29a8f34cc0c0
SHA1dfb71bf35a6f9b449102426295ef4af7f4008dfe
SHA25686a13aa597a155404477aa2654a7372028390f794edf6f4248be574aab87d6eb
SHA51244090855d180ff8d5c5a480db005dffa59bf3e8e42bfa2c86110cf7bcb46d15238edcb3f85e749bf7c891cc2561fca1daa97365de706ec7b06d712acbe79e1ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\datareporting\glean\pending_pings\3470af18-caf7-4558-90fd-44bab4c0126eFilesize
11KB
MD56f4f69d0f9f839cd9babffa52665cba9
SHA13b53a00eb89571f0a4c2c584a01efa3c2badf645
SHA2562de9acab012b0d9b6f8fc00013471b0cbfec2bb9253a72be947626b8f05e7fb8
SHA5124be7f6f9af8a25a65a5ede9ea488ac15468a0ef342b8a791d512afd7e74bdbad401912f1160a6afa2c78e9a384821061693c26a88de46cfb0a3c3e47856231de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\datareporting\glean\pending_pings\4783b9c0-0ef9-4973-94f9-97d122f07b32Filesize
745B
MD540dcbba37a98520612766f52d4730405
SHA18f0bb37964b433c3d963374d2bd7df7d9d803422
SHA2561836e78d19f3342f78dc21e40cfec3ba54a4bb281a6036d38ef7aec810542f83
SHA512f2686fd1a5feaacfa7f23d4e708090b784bf90ff2f75956ee07a668a9191f5320f6af2c5e3a5454487e6952580d56252951d851af0d93e3e6b93a912d5886921
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\prefs-1.jsFilesize
6KB
MD5c73ee5545a2f5083dee4eaa11d701ad3
SHA12209ed556bd42aa136174260f2608af24998c3c3
SHA256a389f2ff4264386d560d2716167d9a1fa14c20078cc0a317538f1393d15dd4c4
SHA51240ae481d755e644925b7425f83d27f5f10a7a5c3943081bcc47102bb161e04e3cc6c8bb22cdb4b4c49b121f57f4cfed41b1d9ad04d13ac44ae297b6df8fe9cb9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\sessionstore.jsonlz4Filesize
831B
MD52d73ade2bb39d2874b0f8b9345994353
SHA14bb9baff834d582b3be1c5bfa26eb313a32769a2
SHA2562c9b67c47e1c7f7cf6184140abb909811bad2dfae8d5552ac0bd6af2e596262f
SHA512e5ec13c4dca5701e27809a12fa5d15be248f49d07d77d1dc5bc71e6e38aa50bf493a02bc51308b9f5bc0d102382f65f3ee8192870f3ae6eab0b482a1784f2bfe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u7g6zvo6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteFilesize
184KB
MD524ef81d1d44aa87a83cf61c79193617a
SHA1e6b8418868619ac3ff97c62a96e47e15aa069af9
SHA256b9028ac5b4d8e6226dae0eb9592fe45c58c930342ce4c5dadd743c188ef9b465
SHA5129e0de5268f5fcd0b8faad23dc0525c908c77f1f47c625d5a7029129805b4e34b5e28fecb2925b0eefd09ae7f809f3d97ff7926645a0e359945360e1a71529a0c
-
\??\pipe\crashpad_2364_GOXRVRQJIPSQJTRJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2220-1-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2220-0-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2588-526-0x0000000003F60000-0x0000000003F70000-memory.dmpFilesize
64KB