Analysis
-
max time kernel
107s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 20:36
General
-
Target
EULEN.exe
-
Size
74KB
-
MD5
de0891586265c0d49245e1590a7c0658
-
SHA1
8e227aedecfbefb4ed05ca5996ed6c006338f6b1
-
SHA256
3576a2c328055287dfcf6b61a2e5352071a56d7a2f92b0064ac19eecddcbb3ed
-
SHA512
ac4a52c7c3940c403f622da6e3543fa0978f2b96277f73e89a64668980f0931616991b2266a235ae13dbfec01886387af135c5dad197d74ec39e2e333460338b
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/zQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfrQYBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
45.88.186.12:5050
uxuwhavlzxq
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Downloads\Unconfirmed 161305.crdownload family_asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
EULEN.exeEULEN.exeEULEN.exepid process 5604 EULEN.exe 5936 EULEN.exe 6024 EULEN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620070337217643" chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
EULEN.exechrome.exepid process 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 1736 chrome.exe 1736 chrome.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe 3436 EULEN.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
EULEN.exepid process 3436 EULEN.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
EULEN.exechrome.exedescription pid process Token: SeDebugPrivilege 3436 EULEN.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe Token: SeCreatePagefilePrivilege 1736 chrome.exe Token: SeShutdownPrivilege 1736 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
Processes:
chrome.exetaskmgr.exepid process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe -
Suspicious use of SendNotifyMessage 39 IoCs
Processes:
chrome.exetaskmgr.exepid process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe 1508 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EULEN.exepid process 3436 EULEN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1736 wrote to memory of 2204 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 2204 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4960 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 2264 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 2264 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe PID 1736 wrote to memory of 4764 1736 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\EULEN.exe"C:\Users\Admin\AppData\Local\Temp\EULEN.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3468,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=4108 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff88dfab58,0x7fff88dfab68,0x7fff88dfab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4496 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4616 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5104 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4828 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1780 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4928 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2716 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3196 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5128 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5184 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5324 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4880 --field-trial-handle=1908,i,11520956000215164094,9481199772234486970,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\EULEN.exe"C:\Users\Admin\Downloads\EULEN.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Users\Admin\Downloads\EULEN.exe"C:\Users\Admin\Downloads\EULEN.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\EULEN.exe"C:\Users\Admin\Downloads\EULEN.exe"1⤵
- Executes dropped EXE
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
432B
MD587a6ca24ce2f592d1b6f4c69b7293e02
SHA15fd5ff64c1943f8db9d97b1781c284096aac4c01
SHA256cc63526e51fbfbd8a8d6e8f7d3702085ea62cf1b3321800f4d02f1fb1d0f064c
SHA512896b8f91b24d64cec978a181cb3b808f150aa444aefec809432889c82876bb727045619f49a935983968a900934d26310f402b12314e29964ac0a9d0a9baeb8e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD581d129e652c73579f563fd1ce466985f
SHA181697ff3f7c55231304e3215f2d52501fc705275
SHA2565d795a2c52d6b23bcdac18f26dde2aab29e7810fff02087acb5c8970d9d1af8b
SHA5125dfdcc10218f23e96b8d61bc5673f4d3a315e4b3ddcb7bfb15360000b3e9d24ada608e3540aca30bfa5d9841468ec6a4075ba932b7950c7ae79f10f74ad06737
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD565ac2fcc5b55e796c9e1ee55f622c7fc
SHA12364eed797888ffaca5562344bd22e5a863e2036
SHA256af7e0a7c511d14deeff603951eee53677fb206ec63610c0ed00039465f865f12
SHA51224f704a567e17d63f003b493c6d9f80e35706adc4a1c1ba1064f21e500158a8fdf93715aa909756a0e068052fd91715e326d05eacd0b823570ae251f34e4169d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
690B
MD5671442003a16691903ecf553ff432cc0
SHA1255dfdcc9ff5c26d9847be7e27588017d2802e11
SHA25688c2d7822f28db9babcdf98e7a4d0f91b4a42d2b604343be7aee145dbf797c83
SHA5125e3a8a3ed986d369e41bd90b8f588929dd2e8dca999d388a8cbd13d78491353c680fe74665382dfafc2d4744b1fdd075f60bc00b02c0c62d2f2e38a66abc5a45
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
858B
MD5c760ddb8df86d045fb6b72b8a95e1ed6
SHA12ff1fd5f36996295c7fff547116ca0447741e0ab
SHA256d9147e0cb3275c50f460e64776975837a1cc9016a1d34ed9ddad7ec96d77f14f
SHA512430e7b3c321ba68e2018e2df39e1a77bf2fae8c79db2d254b7a7481a980020f8ecd65c031554dd00c2053b8b6c745b5062af57a86a575122a2240e0df02be95b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD547be82896ad227d70beed48c209a2a30
SHA158f1568644a53282fae7a3e430340ba417cbc606
SHA2566d494f785724812b689f5e8933660ced01cccdbaab3aec43dd7a152581becdae
SHA5126db6c6677f4fbc2b72f6a13c8e6908510767e9b408bc0b1b7cc9bc7f45ba39f5476ed3b69297e95d8dc674e30659cbf42830d90a7890bdbf79058d7102e13456
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5526853b7e497d9616e2dfbbb6b468c1b
SHA1b9c32dfd609c9d99ace8dd2cd0c84d7d72babce1
SHA2565ef01654554e8eaa249229cf696cfa8d94561c8bab2de59cf004e8b5d832c769
SHA512c46d25e87ec73c32b6107407810f11a24eee55e7c56c12f7648a808c3069b2ec93fb4a2c9b9a11a5be392b28f7ba301657cd9fafa95ee64442ccf175acb8dedc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD500683004c3697d48a41e3a593ef0d56f
SHA1bbc26d9c97cddb448bf076853eed0e9b3f726fd1
SHA256cb785f3622f13437b320d912fa9114720d17d034f7e246df87dec73365e8750c
SHA5123d5b0f77eb52bcc141f35af9ad4a45a6369143662ad0160356bd3de1d862fbcc8da4a93fa478ddf9a5e52452a01c11e02dd536a6c3837818091d670eb9a87e44
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5365e8e796fd37062d34fd5ada6b8ed8c
SHA16cfc757cb17552153c7ef68027552ede8dcb6a38
SHA2568b12d0330c188398281062c2eef3b45159b4874debffe100109f7999851c50d0
SHA512912d62a705d7e5a381d89686baa153b0acad60e82939dea77e34a82268347b1608850fbcd8e67d6e9434b4b9a87f7df1ff88b5e013c4a3d40ee73347c1907632
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD51e3e39b749b243e6c2b1a70cacfa8e01
SHA1b4c182d232b9a916744c912cdd6a92c55a191676
SHA2565507fdae7e8f1e7b8fe586918ac1ee69ba9f65ebba48e5e420bc1bacc2674cf1
SHA512dd27e105e6496bb4d0d7720a2bf39b1f20e872c9f38c14800ab73459b7f92df0474ea2e1509b30de2116f994c5b63c4f172cf59088bcefb3acd659eb482d24ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
261KB
MD51e0697394fb7f97941e2529d9c56e567
SHA1a39f7f99e4e9a1fbca1863707feef647c91a7901
SHA256846aab623a1f0c69bd567edb97504395146d26051c5945173eebce3fbb6a773c
SHA5123ae5ce16352edf7c2341904ed435edf427230fe37a601a063898606d202b65204a54595dc14535289b388d3eb07e0c30eed1c043b61e6a7c730c101edede6801
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
261KB
MD5dd363b95f14eeb20c4f445ac29c97fc7
SHA1b1c811c3277afb8487e479cd27c72f8a53f5cb3d
SHA25632e62f6683a5272e2495e78c1202e85c7c00b1f17e9bcf4f1a11590604292664
SHA512702b068111cd4321fbcf44192ed9cea66031c18b7e93f5a45818229f7de1e30ead4fe56e409fff3a5661c1f7de1b6deea1e259f799b314e264b7014a93bb533c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1Filesize
264KB
MD5d44eb7c1cc46f4b91224ab43da7efd25
SHA17bc08e5da0108b5bfcf787027f0f29d7af86ae5c
SHA2562e0face31031df51720836034f10aa444940590146132810d506c8b105787ba1
SHA5123cfbc38b7e54ec489fb6990fb3c95889229ff87dffb7840f166950cc28166294d5b53201525b0ec17667e2fd339a2288b40a6ca258fdb7d1f2efe1f7f8a66d43
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\EULEN.exe.logFilesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
C:\Users\Admin\AppData\Roaming\MyData\DataLogs.confFilesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
C:\Users\Admin\Downloads\Unconfirmed 161305.crdownloadFilesize
74KB
MD5de0891586265c0d49245e1590a7c0658
SHA18e227aedecfbefb4ed05ca5996ed6c006338f6b1
SHA2563576a2c328055287dfcf6b61a2e5352071a56d7a2f92b0064ac19eecddcbb3ed
SHA512ac4a52c7c3940c403f622da6e3543fa0978f2b96277f73e89a64668980f0931616991b2266a235ae13dbfec01886387af135c5dad197d74ec39e2e333460338b
-
\??\pipe\crashpad_1736_ZLFDYXOSJNOYXSWPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1508-331-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-340-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-337-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-338-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-339-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-341-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-342-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-343-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-332-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/1508-333-0x000001FC1C710000-0x000001FC1C711000-memory.dmpFilesize
4KB
-
memory/3436-51-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-44-0x00007FFF91693000-0x00007FFF91695000-memory.dmpFilesize
8KB
-
memory/3436-1-0x0000000000590000-0x00000000005A8000-memory.dmpFilesize
96KB
-
memory/3436-7-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-4-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-0-0x00007FFF91693000-0x00007FFF91695000-memory.dmpFilesize
8KB
-
memory/3436-3-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-50-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-9-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-69-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/3436-346-0x000000001C410000-0x000000001C42E000-memory.dmpFilesize
120KB
-
memory/3436-345-0x000000001C210000-0x000000001C276000-memory.dmpFilesize
408KB
-
memory/3436-344-0x000000001C290000-0x000000001C306000-memory.dmpFilesize
472KB
-
memory/5604-197-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/5604-198-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB
-
memory/5604-200-0x00007FFF91690000-0x00007FFF92151000-memory.dmpFilesize
10.8MB