Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
281s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/06/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
httpscdn.discordapp.comattachments1.txt
Resource
win11-20240508-en
General
-
Target
httpscdn.discordapp.comattachments1.txt
-
Size
184B
-
MD5
d727dfb40906c1561fe513ccbfd33b2b
-
SHA1
67645efae15afb734e736caefd480960305d04d6
-
SHA256
584612757412638951630e234f5103954d92edb9586e1bd12f3385aa379a3719
-
SHA512
8ade667197b6122ea23a88b6e996ffd62714c4e9201aaa21802de87421a35b7975c94eba2ad6ecb386e52d8e8a66fca48fa5e00dfc850d705594009e69fa7f3c
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133617976719353762" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\IOwnPhan.zip:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1860 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 4748 Winword.exe 4748 Winword.exe 2432 Winword.exe 2432 Winword.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 572 chrome.exe 572 chrome.exe 5948 chrome.exe 5948 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5100 OpenWith.exe 3828 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 5100 OpenWith.exe 4748 Winword.exe 4748 Winword.exe 4748 Winword.exe 4748 Winword.exe 4748 Winword.exe 4748 Winword.exe 4748 Winword.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 3828 OpenWith.exe 2432 Winword.exe 2432 Winword.exe 2432 Winword.exe 2432 Winword.exe 2432 Winword.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1860 2284 cmd.exe 81 PID 2284 wrote to memory of 1860 2284 cmd.exe 81 PID 572 wrote to memory of 1356 572 chrome.exe 87 PID 572 wrote to memory of 1356 572 chrome.exe 87 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 4316 572 chrome.exe 88 PID 572 wrote to memory of 1400 572 chrome.exe 89 PID 572 wrote to memory of 1400 572 chrome.exe 89 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90 PID 572 wrote to memory of 1116 572 chrome.exe 90
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\httpscdn.discordapp.comattachments1.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\httpscdn.discordapp.comattachments1.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xec,0x10c,0x7ffb4f6aab58,0x7ffb4f6aab68,0x7ffb4f6aab782⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:22⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4208 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4388 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4068 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵
- NTFS ADS
PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4468 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4480 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4212 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1800,i,209444178413490016,17780514147478714986,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5948
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2792
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:700
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_IOwnPhan.zip\IOwnPhan\AutoEtherwarp.js"1⤵PID:4500
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5100 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\Temp1_IOwnPhan.zip\IOwnPhan\metadata.json"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3828 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\IOwnPhan\IOwnPhan\AutoEtherwarp.js"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize471B
MD50a06fbebf0625c6ef64e4cfe1827bb58
SHA17d1957800794730917bbd41d8d6ba69568e678d4
SHA2560b74f3612dd52d7879788b6b68e5f9830ac681ad5ddfa4a40bce7f6b9176d67e
SHA512aef47897d0fbe11c4cdd731cafccdaaa7a647a3d07bd1887fea98dc1c9963aefe3a4e99bc5871a15f37fee8a6dd98390cad067ec8b5dab7b8e6eb1a668ec76bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize412B
MD5a49c1431e380a752c84817ba7e758eea
SHA12bf53febc20c31d40476673b2be47987c8c39322
SHA256bf237c3f4f1b1e209aa4c79b962ce109a07206b6e4c1866fe0232d4491d66342
SHA512019af7494d4a8b27de784fe278b2f7c76a4dbf03f8c064f6706b3ce94815840f5105d1a56d884c85bd1920ea1123807ef313a0486a6c682903bcfce8a3515cae
-
Filesize
2KB
MD550ed7d314361dcdb0346397da02fc6b0
SHA1c28f76acee4a529c462903d083e3c997cff29799
SHA2564fa94c798c794eea67e696620a838b5d40efbd368908f03e91749f3ae5901a65
SHA512b3ef5218270ae7a0d9f0fccf0f18d298ffe389e6cd6b58bc5a893e45164d467e30258bfbcc15d1acfd49b16f25d7df8492b8aac6f36b36cce04d9c14db8f6c34
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c5ff5ed201ceab80ed3c4a3db5b9b705
SHA128d92aa2c1a8a8cc18c8141347e2c99a0fc9b2eb
SHA25626553aa674c2e9245cf900bcd2b33aa14bc38e559aac07b3fe809933c35b8cd2
SHA512b7af6ac3cbd0b19bc8175ff9d214b044a2bcf5d934a58446ed6e4af0fbf1a9258468c0549c08e0f750428d1e083084a73fe9cbe604cfbfe45b6a080817ebf497
-
Filesize
7KB
MD5ade4dc7c1aa6530a14d1675856352dac
SHA169f91fa24def1eb4f992365927a933d7aa1cc00b
SHA25654eeaa2158eae3e75361d0dfb729588c641e05698c3ccd86c8b868367c2a14fa
SHA512ed420cc5f408846c9c8ea0cebda22a83559fd9d6c7d236a0cc7927ff6bbfa96e3feb99fe54e9c022dbd69660d9eb1387b1b229c82cb60d7f9fe7ee8cd0e980ee
-
Filesize
16KB
MD5ea039eac2163b91c7224d1aceda26796
SHA1227e22700584db35a1b3779424252d9073800387
SHA256b91f4069d45571f67c105e785215db9e1eb060571a816a3b29670bf863bc25c2
SHA512232c14469ce9f5766684274aaa87681d2a0f793a9983d8e2ada6b06ffe158195401564243639e287abcd6d7ef7559b0b5d78c46c77dfc353960d0630f7826447
-
Filesize
261KB
MD50872a153fc4584061e7fa343b908eb39
SHA1881a50078ade1d48f8017ee4d536dcfc954019a6
SHA256e498ec15759ebb36a88852e25f31df4a0b07800c6f807de71932cbd3bcb13fc0
SHA512e7774c4aaac6d1f3617499049b1512cbcc996e26c5fe36f8f8857cd3ed3a2ca81071e4f2a7d69d5fb093cd8afdeb581e69059cb0dc5c136f9fa484d3fb9cabd5
-
Filesize
21B
MD5f1b59332b953b3c99b3c95a44249c0d2
SHA11b16a2ca32bf8481e18ff8b7365229b598908991
SHA256138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c
SHA5123c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4
-
Filesize
417B
MD5c56ff60fbd601e84edd5a0ff1010d584
SHA1342abb130dabeacde1d8ced806d67a3aef00a749
SHA256200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c
SHA512acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e
-
Filesize
87B
MD5e4e83f8123e9740b8aa3c3dfa77c1c04
SHA15281eae96efde7b0e16a1d977f005f0d3bd7aad0
SHA2566034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31
SHA512bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9
-
Filesize
14B
MD56ca4960355e4951c72aa5f6364e459d5
SHA12fd90b4ec32804dff7a41b6e63c8b0a40b592113
SHA25688301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3
SHA5128544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\AF10BC41-2F5B-45F4-9757-C7B039F5FF5A
Filesize161KB
MD51e91e6fad6d47718bf9c1e22a206fbb4
SHA1f8d09d4ca358454818b7f31957f24044cd373ce0
SHA256692a24a74dc3f99013d6b0496126a7e75e86bcd303308695f5281615b08e8b55
SHA51298ffbfa08e129f41fcb6dd0a1589dd0651bf8c6ffd4a0695c058728c7ff6e824205980a90b4218e4b603fba482f2d2fccc18ec315d16da7eb134ca23f5b85d4b
-
Filesize
21KB
MD5a5e090e57ddeae22329474258cf44f48
SHA1a9c25185e21096e4ef6a8e41c078b71445e4c97d
SHA25652b1ebac1f0b520a39719ffc5308b2b1cd04d4e628b287f24636990d5ff3bbc4
SHA512aa310585e2df2a809263236c6e8024f85c3a96fdf839abf30336eff952e973b0abcc8431a9e43d86f78fc41464293b6595831d53eada664bf7f6eed95558640a
-
Filesize
24KB
MD5b00f3f56c104c94e03cd2ad8452c14e7
SHA151b78e45015e0d9d62fbdf31b75a22535a107204
SHA256ba2b669020334ff01a85bfc900ea4371ea557bd315f154875d9bdfdc16ae8b50
SHA51293e1609be5bbb414c285f37432ce93294c3d1583ef46c7c6c570c122f0b166c34b0ad87de708005c8af97dee27923ba53395a34c2563cdadf3c0a708848b3525
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
257B
MD529002bcddb12277a5f14d5c96a37ac8e
SHA12cfbfb6213d7969d2434eef1a4bc1ef88dcf1cd9
SHA256d936283900512fc4cf81a4b1f011f36d7d54797785d0071c1c757fcdae3b13ef
SHA512e37f3c827d9198c4b158d840214e04ecd73ea8ca368c5c85f3b673b677996288a8d61fa93bdd93fb14fd217fd37368cc160de490c98e0bf0251bd582683401ab
-
Filesize
1KB
MD54228527fac355cec9000915e62c6502c
SHA18d5c2bb5baa6a6c165cf784b96d3705d146ac045
SHA256f7b694fea9110b098f644015a03d5c4ce13afb7eca00d5ba11eab324427509e6
SHA512c89ef26435530c434493c2fe816d901f2437a098d2c1292a2abb18f9c1cb63d4adc9c8da462e1eca449429623b61e28c2c0ca36b2f1adb45bd16487d7ab3b194
-
Filesize
220B
MD5c4b0a033993d9fb0f1b99f733d8baf58
SHA1ecb4b6e3d0cc9bd888f02a590e2dcd2364a50318
SHA2564607579112d8b6c88bbf0c95a2ea3744ace53cd3bcfaa59f728c5343bc2db469
SHA512b4461849d0cde349e9150c338f2d904328bfc31f964a4221f88c653543d2831b13beecf246f9879379f111d57bea4119a2707100663308ef9e6b897465a8c4b9