Analysis
-
max time kernel
146s -
max time network
272s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/06/2024, 03:21
Static task
static1
General
-
Target
GoogleEarthProSetup.exe
-
Size
8.3MB
-
MD5
85a9de6c56b3702c535b01c865e3f68c
-
SHA1
20468ff0c43fd9f0deb5b0d35e09346d3a5497d7
-
SHA256
1f056aaaa7c11d2ebe93058f81527ab9c3fae1a4244c82cc8c69e573bd87032a
-
SHA512
4b31dfe1f63d0f913382729971126445e5ade4115bbf548812869b53cbd6778ea50c65ba68ea305d5de2a2a510a7a4ebd5423079067a899396540bab82f7056c
-
SSDEEP
196608:8gt5LKUjY+A1QtCopK7ogW5o35+VqmXaEvNTWc3KFKxJSN:8A5WUs+A1OCopRX5y54qmXaEvNTx3KFN
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\pci_datum.txt msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\ITRF2014 msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stbranch.glslesv msiexec.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad\metadata updater.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\sk.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stbillboard.ps_2_0 msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\flightsim\controller\speed_link_cougar_flightstick.ini msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\alchemyext.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\flightsim\hud\generic.ini msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stleafmesh.asd msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\hammer_aitoff.glslesv msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\IGExportCommon.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\zh-Hant.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\el.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\es.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\IGGfx.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\plugins\bearer\qnativewifibearer.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\cs.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\inspire_cp_BasicPropertyUnit.gfs msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\flightsim\controller\generic.ini msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\cubewerx_extra.wkt msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\googleearth2x.bat msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\sr.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\de.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stfrond.glslesf msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\flightsim\controller\saitek_x52.ini msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stbillboard.asd msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\prime_meridian.csv msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\default.rsc msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stbranch.arbfp1 msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\zh-Hant-HK.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\Qt5OpenGL.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\spin_icon.png msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\Qt5Widgets.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\notifications.rcc msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\bag_template.xml msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\nl.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\plugins\platforms\qminimal.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\flightsim\controller\speed_link_black_widow.ini msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\en.qm msiexec.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\updater.log updater.exe File created C:\Program Files\Google\Google Earth Pro\client\res\search.rcc msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\unknown_plugin.png msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\IGAttrs.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\userpalette.kml msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\leftpanel-layer.rcc msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\Qt5Qml.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\ruian_vf_st_uvoh_v1.gfs msiexec.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\uninstall.cmd updater.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\th.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\flightsim\controller\logitech_extreme_3d.ini msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stleafmesh.glslesv msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\application.rcc msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\ca.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\alchemy\ogl\IGSg.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\licenses.rcc msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\pcs.override.csv msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\swscale-5.dll msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\gmlasconf.xsd msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\nitf_spec.xsd msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\res\gdal\unit_of_measure.csv msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\lang\no.qm msiexec.exe File created C:\Program Files\Google\Google Earth Pro\client\shaders\stleafcard.cfg msiexec.exe -
Drops file in Windows directory 38 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File created C:\Windows\Installer\e577cc5.msi msiexec.exe File created C:\Windows\SystemTemp\~DF812EA1D7A0339A5D.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFD560E87DB25D0AF8.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF3E165DF060E0D5FA.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp updater.exe File opened for modification C:\Windows\SystemTemp updater.exe File created C:\Windows\SystemTemp\chrome_url_fetcher_2864_1805282875\-65e60e95-0de9-43ff-9f3f-4f7d2dff04b5-_7.3.6.9796_all_adwtpv4uh6jq3ijahrkhnrvwxqnq.crx3 updater.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\~DF2FCD3A9AE82F56BD.TMP msiexec.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Installer\{3470AD08-85F2-4B1D-8487-FC4750732087}\MainIcon.ico msiexec.exe File created C:\Windows\SystemTemp\~DFBECFF3060B848497.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFA158FE22576500B6.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF252A4040E2C09586.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp GoogleEarthProSetup.exe File opened for modification C:\Windows\Installer\e577cc1.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8349.tmp msiexec.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2864_545536462\_metadata\verified_contents.json updater.exe File created C:\Windows\Installer\e577cc1.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF0A7361BA84BD3CB7.TMP msiexec.exe File created C:\Windows\Installer\{3470AD08-85F2-4B1D-8487-FC4750732087}\MainIcon.ico msiexec.exe File created C:\Windows\SystemTemp\~DF95243FE17341621D.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFB601FB6C111733D0.TMP msiexec.exe File created C:\Windows\SystemTemp\Google1068_1967153210\UPDATER.PACKED.7Z GoogleEarthProSetup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2864_545536462\manifest.json updater.exe File created C:\Windows\SystemTemp\~DF9A6DEA0E689DA7FB.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{3470AD08-85F2-4B1D-8487-FC4750732087} msiexec.exe File created C:\Windows\SystemTemp\Google1068_1133379197\bin\uninstall.cmd GoogleEarthProSetup.exe File created C:\Windows\SystemTemp\Google1068_1133379197\bin\updater.exe GoogleEarthProSetup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2864_545536462\manifest.fingerprint updater.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File created C:\Windows\SystemTemp\Google1068_1133379197\updater.7z GoogleEarthProSetup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2864_545536462\googleearth-win-pro-7.3.6.9796-x64.exe updater.exe File created C:\Windows\SystemTemp\~DFB9146F4E7BE06CFE.TMP msiexec.exe -
Executes dropped EXE 7 IoCs
pid Process 3928 updater.exe 4140 updater.exe 3100 updater.exe 3516 updater.exe 2864 updater.exe 3004 updater.exe 2980 googleearth-win-pro-7.3.6.9796-x64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Google msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = a5195ab451ae3440e87bedc1c7f4b89b49229f6c5486bd8e3d22f83ffa38c031 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Google\Google Earth Pro\installed = "1" msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = e40500008303a0079cb4da01 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Google\Google Earth Pro msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "1" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Google\PostInstallLaunch = "C:\\Program Files\\Google\\Google Earth Pro\\client\\googleearth.exe" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Google\Google Earth Pro googleearth-win-pro-7.3.6.9796-x64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Google\Google Earth Pro\DesktopShortcutInstalled = "1" msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258}\1.0\ = "GoogleUpdater TypeLib for IUpdateStateSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{85AE4AE3-8530-516B-8BE4-A456BF2637D3} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\80DA07432F58D1B44878CF7405370278\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\ = "IPolicyStatus" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\AppID = "{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\ = "IUpdateStateSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\1.0\0\win64 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\1.0\0\win64 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4622B28-A747-44C7-96AF-319BE5C3B261}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4334319-8210-469B-8262-DD03623FEB5B}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ = "IAppVersionWeb" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\1.0\0\win32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\80DA07432F58D1B44878CF7405370278\ProductName = "Google Earth Pro" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{699F07AD-304C-5F71-A2DA-ABD765965B54}\ = "IUpdaterAppStatesCallbackSystem" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\ProgID updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4334319-8210-469B-8262-DD03623FEB5B}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4622B28-A747-44C7-96AF-319BE5C3B261}\TypeLib\Version = "1.0" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\1.0\0 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B685B009-DBC4-4F24-9542-A162C3793E77}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{F4334319-8210-469B-8262-DD03623FEB5B} updater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleEarth.kmlfile\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\1.0\ = "GoogleUpdater TypeLib for IProcessLauncher2" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\TypeLib\ = "{0CD01D1E-4A1C-489D-93B9-9B6672877C57}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\ = "IPolicyStatus2" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\TypeLib updater.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\LocalServer32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\ = "IProcessLauncherSystem" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B685B009-DBC4-4F24-9542-A162C3793E77}\1.0\ = "GoogleUpdater TypeLib for IPolicyStatusSystem" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F966A529-43C6-4710-8FF4-0B456324C8F4}\ = "IPolicyStatus4System" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{F966A529-43C6-4710-8FF4-0B456324C8F4}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\TypeLib\ = "{8476CE12-AE1F-4198-805C-BA0F9B783F57}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{34527502-D3DB-4205-A69B-789B27EE0414}\1.0\0\win32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{27634814-8E41-4C35-8577-980134A96544}\TypeLib\Version = "1.0" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0\0\win64 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4622B28-A747-44C7-96AF-319BE5C3B261}\TypeLib\ = "{C4622B28-A747-44C7-96AF-319BE5C3B261}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F966A529-43C6-4710-8FF4-0B456324C8F4}\TypeLib\ = "{F966A529-43C6-4710-8FF4-0B456324C8F4}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{05A30352-EB25-45B6-8449-BCA7B0542CE5} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4334319-8210-469B-8262-DD03623FEB5B}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\1.0 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{494B20CF-282E-4BDD-9F5D-B70CB09D351E} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\1.0\ = "GoogleUpdater TypeLib for IPolicyStatus3" updater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleEarth.kmzfile\shell\open msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{DF978A78-4301-5160-9D81-9DA6EED2B58F}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\TypeLib\ = "{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\1.0 updater.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3928 updater.exe 3928 updater.exe 3928 updater.exe 3928 updater.exe 3928 updater.exe 3928 updater.exe 3100 updater.exe 3100 updater.exe 3100 updater.exe 3100 updater.exe 3100 updater.exe 3100 updater.exe 2864 updater.exe 2864 updater.exe 2864 updater.exe 2864 updater.exe 2864 updater.exe 2864 updater.exe 2864 updater.exe 2864 updater.exe 3260 msedge.exe 3260 msedge.exe 1192 msedge.exe 1192 msedge.exe 1508 msiexec.exe 1508 msiexec.exe 2972 msedge.exe 2972 msedge.exe 3672 identity_helper.exe 3672 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 1068 GoogleEarthProSetup.exe Token: SeIncBasePriorityPrivilege 1068 GoogleEarthProSetup.exe Token: SeShutdownPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeIncreaseQuotaPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeSecurityPrivilege 1508 msiexec.exe Token: SeCreateTokenPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeAssignPrimaryTokenPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeLockMemoryPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeIncreaseQuotaPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeMachineAccountPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeTcbPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeSecurityPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeTakeOwnershipPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeLoadDriverPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeSystemProfilePrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeSystemtimePrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeProfSingleProcessPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeIncBasePriorityPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeCreatePagefilePrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeCreatePermanentPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeBackupPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeRestorePrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeShutdownPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeDebugPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeAuditPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeSystemEnvironmentPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeChangeNotifyPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeRemoteShutdownPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeUndockPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeSyncAgentPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeEnableDelegationPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeManageVolumePrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeImpersonatePrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeCreateGlobalPrivilege 2980 googleearth-win-pro-7.3.6.9796-x64.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1068 wrote to memory of 3928 1068 GoogleEarthProSetup.exe 78 PID 1068 wrote to memory of 3928 1068 GoogleEarthProSetup.exe 78 PID 1068 wrote to memory of 3928 1068 GoogleEarthProSetup.exe 78 PID 3928 wrote to memory of 4140 3928 updater.exe 79 PID 3928 wrote to memory of 4140 3928 updater.exe 79 PID 3928 wrote to memory of 4140 3928 updater.exe 79 PID 3100 wrote to memory of 3516 3100 updater.exe 81 PID 3100 wrote to memory of 3516 3100 updater.exe 81 PID 3100 wrote to memory of 3516 3100 updater.exe 81 PID 2864 wrote to memory of 3004 2864 updater.exe 84 PID 2864 wrote to memory of 3004 2864 updater.exe 84 PID 2864 wrote to memory of 3004 2864 updater.exe 84 PID 2864 wrote to memory of 2980 2864 updater.exe 87 PID 2864 wrote to memory of 2980 2864 updater.exe 87 PID 2864 wrote to memory of 2980 2864 updater.exe 87 PID 1192 wrote to memory of 4684 1192 msedge.exe 92 PID 1192 wrote to memory of 4684 1192 msedge.exe 92 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 1356 1192 msedge.exe 93 PID 1192 wrote to memory of 3260 1192 msedge.exe 94 PID 1192 wrote to memory of 3260 1192 msedge.exe 94 PID 1192 wrote to memory of 1952 1192 msedge.exe 95 PID 1192 wrote to memory of 1952 1192 msedge.exe 95 PID 1192 wrote to memory of 1952 1192 msedge.exe 95 PID 1192 wrote to memory of 1952 1192 msedge.exe 95 PID 1192 wrote to memory of 1952 1192 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\GoogleEarthProSetup.exe"C:\Users\Admin\AppData\Local\Temp\GoogleEarthProSetup.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SystemTemp\Google1068_1133379197\bin\updater.exe"C:\Windows\SystemTemp\Google1068_1133379197\bin\updater.exe" --install=appguid={65E60E95-0DE9-43FF-9F3F-4F7D2DFF04B5}&iid={65E60E95-0DE9-43FF-9F3F-4F7D2DFF04B5}&lang=en&browser=4&usagestats=1&appname=Google%20Earth%20Pro&needsadmin=True&brand=GGGE --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=22⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SystemTemp\Google1068_1133379197\bin\updater.exeC:\Windows\SystemTemp\Google1068_1133379197\bin\updater.exe --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x2a4,0x2a8,0x2ac,0xd4,0x2b0,0x70758c,0x707598,0x7075a43⤵
- Executes dropped EXE
PID:4140
-
-
-
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --system --windows-service --service=update-internal1⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x2a0,0x2a4,0x2a8,0x27c,0x2ac,0x139758c,0x1397598,0x13975a42⤵
- Executes dropped EXE
PID:3516
-
-
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --system --windows-service --service=update1⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x139758c,0x1397598,0x13975a42⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2864_545536462\googleearth-win-pro-7.3.6.9796-x64.exe"C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2864_545536462\googleearth-win-pro-7.3.6.9796-x64.exe" REBOOT=ReallySuppress OMAHA=1 ALLUSERS=1 REINSTALLMODE=emus2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff12e63cb8,0x7fff12e63cc8,0x7fff12e63cd82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5538004843454166430,16765972260323997574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:5992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:5060
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:5228
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:5260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:1504
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:5476
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD54508a0e1192dcd06c32b716180087213
SHA14e0b5095eaf71f62f9f73f46ff56986f068de9b3
SHA256276e8c082f84f2160c400524f0fc224241b7b071aa77a4cbeeb636da81b2eb60
SHA512bbce32384d414931937b3ce28475b86b0ce2c2d50827c9a42cb147b126b8e16102e30707bdba8e7ee1374234797457192e22e3d4c6cefc783bfaeaf09e623e96
-
Filesize
615B
MD5d6d5afd6f9541058ce0abc95283f159d
SHA11b27396c5142ed77761b003ee191195447dcd403
SHA256b822df5815367a3ad9a113c8ae287e9c48a378d4be86e8f81c14e9de9c755fb1
SHA512583a91e35ea39fbf80454ed474e33a7b3ff7e24d1dd1e05fdd67485475de7537df8910bba3d113812faa37800ce201347b602067fde72ad8b39fee862750e8c1
-
Filesize
354B
MD5105efb8f33a0e5b5d6ed5b5d705eb4b4
SHA1e59d6a3500b52fbf2d6207936704d549a75ad352
SHA25667ace1ff22a16d8ee6996c7c51013f42da673ee03a2aeae81a6b96720d82c564
SHA51243a2a2b9ca27a67c0f588e501684a98fb293e65150f9f675a4a0b523968f3cd9b5b01063ddb0ea9f20fbdbbdea08f241e59053e47fa15eac7ce59d0185fa1651
-
Filesize
711B
MD5786429912ac84ae250055a47d0f8227c
SHA1df893ebfc9d0253f39eda4ef21bc1f58624ddf4b
SHA256f3fb6a4b82630065c81a61685d021e84299298b1d4aa039b8ffd3b07ffb63150
SHA51287e08c2ece2b1e9560cb89189164dfd43bf99933058c4458887e0b7a7d68cfb580413cd8de1502dd079adcff0a61ab3f15e0b5f783c838b23630968418daf13f
-
Filesize
49B
MD5bdce395b453a0a3ffcf742feb2a210ae
SHA18bfc909ac17238d49d93a3668256b92766391452
SHA25682f7226a5b6be7356507c368ca2468c5d9b7d4a4036fa18d85c6a99e2f0eae41
SHA512cf4d12cecd6d749990265779d1f9ec5e505b54cf283580f611cd346aaca17816b4c58547bb61c451190c07b651d967f2d03c13b74e2210195514f8087b92288e
-
Filesize
4KB
MD54cf49975894789d3367fbff8f817d768
SHA14c5030c8771953d24335a9a758ca79e48987e681
SHA256ea28d977ed932230f1eeb56bfc8f090db757bc71a34f20c9f38dc7a07438a4bd
SHA5125071ffc3992524bb9002da965dcc8f5f8462f51e83209e861951a467022a659c903174b86da8dd1c3a488e5d229e9f302f55651c3dd2e2f08a94a81dfc992757
-
Filesize
5KB
MD56a6e2efaf5cff19d99d5dd447b5e2bf6
SHA1560c24026376dd870450d87efa2850b6feb09439
SHA25674c97510027a7f87645575acbd309cf729af82772dc27c1799d41ac940cca76c
SHA512d09d1ebec1b704ebb72d00a2d3d3d561667142c70ea61cb9e31e678172000c2a9b00609365fdf8dbad9baf6e9245b3a285e456c42b96ba173d59c76904436e0d
-
Filesize
10KB
MD53a611ddc489d6ebf210c1475e02ab99f
SHA19b6e48ecdb2a1b88d008083d0f38aa98414b7bdc
SHA256b1f5fe9d24c622dff428bf447010aac46868e9fa5f5a03db6733875bf762499c
SHA51257bfea8a155bc4afc0e956706d01da35aa52a6736667172cc3e2e2e9bc71ac1ef2d4ef8246c695b95b50809d31c2593660b7bd4832d13e17b0fb6573c5396c41
-
Filesize
11KB
MD57ddb967c484940c96701b30630ddc2c0
SHA18512bf6bbd9a52ce59210031fe45dfa2b756e407
SHA2563fe9d897ba3f98c35e82192e9cd7d25d66cb44775fd0fc376216cc44e04c7588
SHA512dee1e720cecc77a0091ed9dbb27004190e0f04afa2577c2e87a66de2b262e773b0b71dd23e0d5e15fd451d9c90b1d555c9ababd2f1861e51515e3113426057f6
-
Filesize
993B
MD5a591db37c42bbaa7d56c6caae4ae7b84
SHA1d9d065c60e20d52312c02a157214ce7d1c234d07
SHA256f6e521d73ad7b3c5ad2d5374b548b9d9a93577142a8dd152a8e28d44d35da6e7
SHA512a348fa145c3054785c5578dace39f08fdb24a87e006c13f03d0bc07b4050a316e458a1295d21ed5d84300fc4f1429ad574f30fe665c4d814bb217daeaa2c9710
-
Filesize
1KB
MD556ef0e4bd9a9b46a9306c0bf2ebed34d
SHA13e3521212e1247758a67d4e35a549b08512bfeb0
SHA25622241cb941b345efb5c01adae04f54e06a16492f46e8c2d45cd970f062ca6813
SHA512b2528c42998edd9e294eb7852bc30b786a91624e465908376f9aec2e5e146e38a8264fdfd9d26f42afaa3909fef197ea58c8d2fc1e6d10843712f39a6f64f9d7
-
Filesize
2.1MB
MD5f221c16233073565f7bb7519b6337098
SHA1692568985af214395b9ae480dde9bdb857f24591
SHA256188cc6dcaece88c08c8a527169e048f49a993843a623b5ca293e4c70a4474142
SHA5128a7da5b62f24bcd59ca9b58b1734100ccb41858e7ca9ebb2b43250b4f51aea865daffbae962201b914d6eb22805a77b522394e7ba9d7a02df7469e466e4ceabe
-
Filesize
152B
MD5d0f84c55517d34a91f12cccf1d3af583
SHA152bd01e6ab1037d31106f8bf6e2552617c201cea
SHA2569a24c67c3ec89f5cf8810eba1fdefc7775044c71ed78a8eb51c8d2225ad1bc4c
SHA51294764fe7f6d8c182beec398fa8c3a1948d706ab63121b8c9f933eef50172c506a1fd015172b7b6bac898ecbfd33e00a4a0758b1c8f2f4534794c39f076cd6171
-
Filesize
152B
MD5ade01a8cdbbf61f66497f88012a684d1
SHA19ff2e8985d9a101a77c85b37c4ac9d4df2525a1f
SHA256f49e20af78caf0d737f6dbcfc5cc32701a35eb092b3f0ab24cf339604cb049b5
SHA512fa024bd58e63402b06503679a396b8b4b1bc67dc041d473785957f56f7d972317ec8560827c8008989d2754b90e23fc984a85ed7496f05cb4edc2d8000ae622b
-
Filesize
5KB
MD5c7d9dfdc330f30dbbbabb1e67abb111e
SHA10a902b8b582b3e54ae683a7c5bb1c64fd076fc8b
SHA2565d44a4da917e4b9dc3f844a3833885bcd1e778e969426369c9bc601ee52de8d3
SHA51246b11a32658508ff260ae33581625917aa0ed634a6d8d01f95b3fd2e436233e50987284e891cdbb734562f0a57f8da1398ae960e966747cf00f925195bf318e6
-
Filesize
5KB
MD51955c6aeb9f7dcc5aacf04d04195a1a5
SHA15010ad0d1b244dee4b116aa80918c439b7261f81
SHA25666a0b17ffdf5dad8aec7299dcfcf547bd2f02d34815d7c4c52c991277deb92ec
SHA512f4d789fcce2edbd51a8a032cc5866e6154d8634b3c4f70c93b8e968875b4d0a4718a4ace8479cc2c2ee2f0a0209f008b75cfc98941423452567618f78e715e5b
-
Filesize
5KB
MD5c9b2dc08d6f1300b450e22b4fa50034a
SHA116564ad1685d83a65057843b14183eaae860d15f
SHA25607c5ba3dc2e8928122e3f87889549dbea83abfe78965eda4f5b38057545eccf1
SHA512b9b86cd07ef686e5684938dbd9321b092fc17c43ef251d10bfb7c157ae4419d048e58cb0c4a167ab4881139e59ced5721248b5c4a2993032910736ed282aab99
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c60582443ee20f50c584626f429f6f5c
SHA1885c8aa874d03d7371e89dfe84a854395cf04633
SHA2565ef99cd0fcb7454e9e313e6ccea1259445eb0b995b2d7b9ee2c639dfe35f5611
SHA512850531815c3c35f8fd2fe85da120efacfe2d6bf855591ab35127e9395dfe30f9cadcac58af314dad21a9b2e2a593f05bda9e0a1e8557353445b79b813d74d02b
-
Filesize
11KB
MD5e4699491d90b834b19d847bfcca20087
SHA1488f7e8fa5c3accf837aea96cf1e549275fb587c
SHA256b44228189d16b54337dff1fe2f8992505c5942d4a342582877ec3b584c56a848
SHA512bf846b1146c4351ff62da843c7de391203f93391217866ba29e58a17de8f3a7ab9af84d7134b68a77c32712a547b8f610ffcbdfbcda64aadc11cfbee21930d7c
-
Filesize
264KB
MD56d8f72791ca2afb11c8d24a4916bba86
SHA1a0530360d0cc98e3b5976ff69ee30e2a766b877b
SHA2569da5e749c914ae1addb6a839f9b12502e1bef36a752b4a5b602ea399626df05f
SHA51293fcbef33fbaf3a3770c41e74089fff4c67e9163b20f51e3ab434aa8f78cbebbad26a6f874ee28d4e58512a4d96d14a099ced6265d23587bd60e5e9dd9c45a0b
-
Filesize
706B
MD5df9716377cac26e8b9ae02b1649086ea
SHA1b8687fd8b04a302b93da0b1e78745ca7740f5fe7
SHA2565abf3d0fcccc315d8fae3ac1167d71a412b19e31b509dc1142213005b930818e
SHA51292b90dafff04ef3fdd1023e1ef1c3b6e8db13d97b3a4ad4f2d6614c1096831206d6d4a5009f83450c88193d7e6b619736f1c6be11adf90a797602ef31bb7f6f7
-
Filesize
4.6MB
MD5675c9a53a09d5385bbdb3a43a88f2493
SHA171d1c311eadd4d5949c0b48def8ad0f2186bc243
SHA256ebb428a4c1e29192617e7699513ec78512735110bba68bbee54dee34807094ae
SHA512e3b1d8351b6d208678673e4c69aea745de5b2576a43d2cf9e06c1ea0780dcbc2ca56d5d5fc712b80309ba7950b90130ca2780185b71c990ea6c6062bd29f5136
-
Filesize
1.0MB
MD5be8fd8042dad1b853e09f5ccd34ca295
SHA1009956bebc63a75bf8e7e385a2197d8ef386b40f
SHA25634d541d89b38d150c2c18362b8db34fdac0c6fe72cf5be277bb598cc0b0418d0
SHA512716ad097c41a70e25aa33a8b3f4f7fec76aac5e4b4e21b26d1ccd5376cd76871315bdecf453eec2bb6449b5ab853019427d58dbef4c6dc3467940f8d85eaa1ab
-
Filesize
1KB
MD57c461cb5c4dc800dac2d83bd85fa3678
SHA1d303bcb28515c36f057a165ee627d5b154dc3e8e
SHA25691024f16141a0f558cb341656da96616b1d78f030dda67ca7a74d6e33dc02e84
SHA512dbd2e9ab9c0a670c7029c2bc4e6c63ab5234e721db95da79c5848433e830b5eeb581147b57e93597cee08059560187800f8d90878e5fe60d7b490b0538f8f5d5