Analysis Overview
SHA256
721a4b64330caaa0a64de7a355c76add6f50a90ce6039fbb17a8db6ddfd8debc
Threat Level: Shows suspicious behavior
The file tbk.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Enumerates physical storage devices
Unsigned PE
Detects Pyinstaller
Suspicious use of SendNotifyMessage
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies registry class
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Suspicious use of FindShellTrayWindow
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-06 07:04
Signatures
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-06 07:04
Reported
2024-06-06 07:07
Platform
win7-20240221-en
Max time kernel
117s
Max time network
122s
Command Line
Signatures
Loads dropped DLL
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\tbk.exe
"C:\Users\Admin\AppData\Local\Temp\tbk.exe"
C:\Users\Admin\AppData\Local\Temp\tbk.exe
"C:\Users\Admin\AppData\Local\Temp\tbk.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c mode con cols=77 lines=27
C:\Windows\system32\mode.com
mode con cols=77 lines=27
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c
Network
| Country | Destination | Domain | Proto |
| N/A | 127.0.0.1:49264 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\_MEI21042\python38.dll
| MD5 | d2a8a5e7380d5f4716016777818a32c5 |
| SHA1 | fb12f31d1d0758fe3e056875461186056121ed0c |
| SHA256 | 59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9 |
| SHA512 | ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\VCRUNTIME140.dll
| MD5 | 0e675d4a7a5b7ccd69013386793f68eb |
| SHA1 | 6e5821ddd8fea6681bda4448816f39984a33596b |
| SHA256 | bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1 |
| SHA512 | cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\base_library.zip
| MD5 | 802121028264cd071827a5ab62552092 |
| SHA1 | d622736c78fc64d6a1d3ca81572acacf06727cbc |
| SHA256 | 2f276b628f11077b78a78dd82df94eab300e68e562d3daa9a743458db0b3d047 |
| SHA512 | d4d77c2aa497aeef1e70dc82376e699b036c690c5ab78a2274ab5f943e1966109069c6b52b89586fb770387be88dcccc38e16df3dff1d94bfab5497e1f716ac7 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_ctypes.pyd
| MD5 | f1e33a8f6f91c2ed93dc5049dd50d7b8 |
| SHA1 | 23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4 |
| SHA256 | 9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4 |
| SHA512 | 229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\libffi-7.dll
| MD5 | 4424baf6ed5340df85482fa82b857b03 |
| SHA1 | 181b641bf21c810a486f855864cd4b8967c24c44 |
| SHA256 | 8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79 |
| SHA512 | 8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_socket.pyd
| MD5 | d6bae4b430f349ab42553dc738699f0e |
| SHA1 | 7e5efc958e189c117eccef39ec16ebf00e7645a9 |
| SHA256 | 587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef |
| SHA512 | a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\select.pyd
| MD5 | 6ae54d103866aad6f58e119d27552131 |
| SHA1 | bc53a92a7667fd922ce29e98dfcf5f08f798a3d2 |
| SHA256 | 63b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88 |
| SHA512 | ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_ssl.pyd
| MD5 | 8ee827f2fe931163f078acdc97107b64 |
| SHA1 | 149bb536f3492bc59bd7071a3da7d1f974860641 |
| SHA256 | eaeefa6722c45e486f48a67ba18b4abb3ff0c29e5b30c23445c29a4d0b1cd3e4 |
| SHA512 | a6d24e72bf620ef695f08f5ffde70ef93f42a3fa60f7c76eb0f521393c595717e05ccb7a61ae216c18fe41e95fb238d82637714cf5208ee8f1dd32ae405b5565 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\libcrypto-1_1.dll
| MD5 | bf83f8ad60cb9db462ce62c73208a30d |
| SHA1 | f1bc7dbc1e5b00426a51878719196d78981674c4 |
| SHA256 | 012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d |
| SHA512 | ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\libssl-1_1.dll
| MD5 | fe1f3632af98e7b7a2799e3973ba03cf |
| SHA1 | 353c7382e2de3ccdd2a4911e9e158e7c78648496 |
| SHA256 | 1ce7ba99e817c1c2d71bc88a1bdd6fcad82aa5c3e519b91ebd56c96f22e3543b |
| SHA512 | a0123dfe324d3ebf68a44afafca7c6f33d918716f29b063c72c4a8bd2006b81faea6848f4f2423778d57296d7bf4f99a3638fc87b37520f0dcbeefa3a2343de0 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_asyncio.pyd
| MD5 | fe9322e00324b59c179d4c9803322b6c |
| SHA1 | 4d27aa7b1d38ee633de49256bb26a9ee47eb9ef1 |
| SHA256 | 46967e4ef54e222dcda43b64032a3f22ed9fce4cebbe0e64288ed80f86a500eb |
| SHA512 | 29d65bd6e81325cb17ef105a2e4bf3b65c859389da1bd98036227b45bd4496c31aec6427df5fbd7dc9bec482b18d1481abcb7cbfe34dce7229b4a33b971219b8 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_overlapped.pyd
| MD5 | 1b04bd84bdd90b8419e2a658a1cacc6e |
| SHA1 | c016487aa0455a8bb664f306fb4ad3e7e64811f2 |
| SHA256 | 44f9ed9d97881b29ecc79a2b3077760a4f9f7b5ba386751c0f3b98f1bfb0d8c4 |
| SHA512 | 24e86b3325d00484dd5da6198bd5e935fed0b31c4d1fba8d41340d39863e1e47c499899ca82bf477a007f6a636cf296702ece9b457a43a4aaec6b38569cfa2e3 |
\Users\Admin\AppData\Local\Temp\_MEI21042\_bz2.pyd
| MD5 | 3dc8af67e6ee06af9eec52fe985a7633 |
| SHA1 | 1451b8c598348a0c0e50afc0ec91513c46fe3af6 |
| SHA256 | c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929 |
| SHA512 | da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_lzma.pyd
| MD5 | 37057c92f50391d0751f2c1d7ad25b02 |
| SHA1 | a43c6835b11621663fa251da421be58d143d2afb |
| SHA256 | 9442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764 |
| SHA512 | 953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\multidict\_multidict.cp38-win_amd64.pyd
| MD5 | 4d07e807a855be02a94c292dc66cb379 |
| SHA1 | 2d8d742a1179627f1fd702430c3ee106b72988aa |
| SHA256 | 6ccb02ca328a9df23d5f5c7ce58fbf7b9f84474c801230c6c42eab171ed83744 |
| SHA512 | 1576744a545abc7158525ec0e0e7930a7ed14016ce4d3ea157261e6be204a5e490937387718fe9b444f0d5ccfff866cd3426c1481ec31e293f59928d097895d1 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_hashlib.pyd
| MD5 | a6448bc5e5da21a222de164823add45c |
| SHA1 | 6c26eb949d7eb97d19e42559b2e3713d7629f2f9 |
| SHA256 | 3692fc8e70e6e29910032240080fc8109248ce9a996f0a70d69acf1542fca69a |
| SHA512 | a3833c7e1cf0e4d181ac4de95c5dfa685cf528dc39010bf0ac82864953106213eccff70785021ccb05395b5cf0dcb89404394327cd7e69f820d14dfa6fba8cba |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\unicodedata.pyd
| MD5 | 4c0d43f1a31e76255cb592bb616683e7 |
| SHA1 | 0a9f3d77a6e064baebacacc780701117f09169ad |
| SHA256 | 0f84e9f0d0bf44d10527a9816fcab495e3d797b09e7bbd1e6bd666ceb4b6c1a8 |
| SHA512 | b8176a180a441fe402e86f055aa5503356e7f49e984d70ab1060dee4f5f17fcec9c01f75bbff75ce5f4ef212677a6525804be53646cc0d7817b6ed5fd83fd778 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\yarl\_quoting_c.cp38-win_amd64.pyd
| MD5 | e96e99fc84249de9c4cd4649f3a27f7b |
| SHA1 | 4fcf885311d24a2ce438842bb7db269550709a00 |
| SHA256 | 3730432069213e61d347d65be318c32a81dfebc56397de6a900c0b71f2aea303 |
| SHA512 | 19aa039867085a5bba72308f514a614ba4703cc1299d6367b20d6ae7573f44a944f4ab46e3ea751e8a7bc63ebb97bf4fd32e60c480f31c4f9ff425725b690f79 |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\_queue.pyd
| MD5 | 44b72e0ad8d1e1ec3d8722088b48c3c5 |
| SHA1 | e0f41bf85978dd8f5abb0112c26322b72c0d7770 |
| SHA256 | 4aa1bbde1621c49edab4376cf9a13c1aa00a9b0a9905d9640a2694ef92f77d5e |
| SHA512 | 05853f93c6d79d8f9c96519ce4c195b9204df1255b01329deaa65e29bd3e988d41454cd305e2199404f587e855737879c330638f2f07bff11388a49e67ba896c |
C:\Users\Admin\AppData\Local\Temp\_MEI21042\certifi\cacert.pem
| MD5 | 3dcd08b803fbb28231e18b5d1eef4258 |
| SHA1 | b81ea40b943cd8a0c341f3a13e5bc05090b5a72a |
| SHA256 | de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e |
| SHA512 | 9cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-06 07:04
Reported
2024-06-06 07:07
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
Loads dropped DLL
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133621311313455828" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\tbk.exe
"C:\Users\Admin\AppData\Local\Temp\tbk.exe"
C:\Users\Admin\AppData\Local\Temp\tbk.exe
"C:\Users\Admin\AppData\Local\Temp\tbk.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c mode con cols=77 lines=27
C:\Windows\system32\mode.com
mode con cols=77 lines=27
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3236,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=4224 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc8298ab58,0x7ffc8298ab68,0x7ffc8298ab78
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2108 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4360 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4500 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4608 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4908 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4676 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2724 --field-trial-handle=1952,i,16612892237125781727,4848852886706155336,131072 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 155.61.62.23.in-addr.arpa | udp |
| N/A | 127.0.0.1:49879 | tcp | |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 3.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 106.201.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | apis.google.com | udp |
| GB | 142.250.200.14:443 | apis.google.com | udp |
| US | 8.8.8.8:53 | 195.212.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | udp |
| US | 8.8.8.8:53 | 238.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| GB | 142.250.187.206:443 | clients2.google.com | udp |
| GB | 142.250.187.206:443 | clients2.google.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 123.10.44.20.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\_MEI30602\python38.dll
| MD5 | d2a8a5e7380d5f4716016777818a32c5 |
| SHA1 | fb12f31d1d0758fe3e056875461186056121ed0c |
| SHA256 | 59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9 |
| SHA512 | ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\VCRUNTIME140.dll
| MD5 | 0e675d4a7a5b7ccd69013386793f68eb |
| SHA1 | 6e5821ddd8fea6681bda4448816f39984a33596b |
| SHA256 | bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1 |
| SHA512 | cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\base_library.zip
| MD5 | 802121028264cd071827a5ab62552092 |
| SHA1 | d622736c78fc64d6a1d3ca81572acacf06727cbc |
| SHA256 | 2f276b628f11077b78a78dd82df94eab300e68e562d3daa9a743458db0b3d047 |
| SHA512 | d4d77c2aa497aeef1e70dc82376e699b036c690c5ab78a2274ab5f943e1966109069c6b52b89586fb770387be88dcccc38e16df3dff1d94bfab5497e1f716ac7 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_ctypes.pyd
| MD5 | f1e33a8f6f91c2ed93dc5049dd50d7b8 |
| SHA1 | 23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4 |
| SHA256 | 9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4 |
| SHA512 | 229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\libffi-7.dll
| MD5 | 4424baf6ed5340df85482fa82b857b03 |
| SHA1 | 181b641bf21c810a486f855864cd4b8967c24c44 |
| SHA256 | 8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79 |
| SHA512 | 8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_socket.pyd
| MD5 | d6bae4b430f349ab42553dc738699f0e |
| SHA1 | 7e5efc958e189c117eccef39ec16ebf00e7645a9 |
| SHA256 | 587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef |
| SHA512 | a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\select.pyd
| MD5 | 6ae54d103866aad6f58e119d27552131 |
| SHA1 | bc53a92a7667fd922ce29e98dfcf5f08f798a3d2 |
| SHA256 | 63b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88 |
| SHA512 | ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_ssl.pyd
| MD5 | 8ee827f2fe931163f078acdc97107b64 |
| SHA1 | 149bb536f3492bc59bd7071a3da7d1f974860641 |
| SHA256 | eaeefa6722c45e486f48a67ba18b4abb3ff0c29e5b30c23445c29a4d0b1cd3e4 |
| SHA512 | a6d24e72bf620ef695f08f5ffde70ef93f42a3fa60f7c76eb0f521393c595717e05ccb7a61ae216c18fe41e95fb238d82637714cf5208ee8f1dd32ae405b5565 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\libcrypto-1_1.dll
| MD5 | bf83f8ad60cb9db462ce62c73208a30d |
| SHA1 | f1bc7dbc1e5b00426a51878719196d78981674c4 |
| SHA256 | 012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d |
| SHA512 | ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\libssl-1_1.dll
| MD5 | fe1f3632af98e7b7a2799e3973ba03cf |
| SHA1 | 353c7382e2de3ccdd2a4911e9e158e7c78648496 |
| SHA256 | 1ce7ba99e817c1c2d71bc88a1bdd6fcad82aa5c3e519b91ebd56c96f22e3543b |
| SHA512 | a0123dfe324d3ebf68a44afafca7c6f33d918716f29b063c72c4a8bd2006b81faea6848f4f2423778d57296d7bf4f99a3638fc87b37520f0dcbeefa3a2343de0 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_asyncio.pyd
| MD5 | fe9322e00324b59c179d4c9803322b6c |
| SHA1 | 4d27aa7b1d38ee633de49256bb26a9ee47eb9ef1 |
| SHA256 | 46967e4ef54e222dcda43b64032a3f22ed9fce4cebbe0e64288ed80f86a500eb |
| SHA512 | 29d65bd6e81325cb17ef105a2e4bf3b65c859389da1bd98036227b45bd4496c31aec6427df5fbd7dc9bec482b18d1481abcb7cbfe34dce7229b4a33b971219b8 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_overlapped.pyd
| MD5 | 1b04bd84bdd90b8419e2a658a1cacc6e |
| SHA1 | c016487aa0455a8bb664f306fb4ad3e7e64811f2 |
| SHA256 | 44f9ed9d97881b29ecc79a2b3077760a4f9f7b5ba386751c0f3b98f1bfb0d8c4 |
| SHA512 | 24e86b3325d00484dd5da6198bd5e935fed0b31c4d1fba8d41340d39863e1e47c499899ca82bf477a007f6a636cf296702ece9b457a43a4aaec6b38569cfa2e3 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_bz2.pyd
| MD5 | 3dc8af67e6ee06af9eec52fe985a7633 |
| SHA1 | 1451b8c598348a0c0e50afc0ec91513c46fe3af6 |
| SHA256 | c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929 |
| SHA512 | da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_hashlib.pyd
| MD5 | a6448bc5e5da21a222de164823add45c |
| SHA1 | 6c26eb949d7eb97d19e42559b2e3713d7629f2f9 |
| SHA256 | 3692fc8e70e6e29910032240080fc8109248ce9a996f0a70d69acf1542fca69a |
| SHA512 | a3833c7e1cf0e4d181ac4de95c5dfa685cf528dc39010bf0ac82864953106213eccff70785021ccb05395b5cf0dcb89404394327cd7e69f820d14dfa6fba8cba |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\multidict\_multidict.cp38-win_amd64.pyd
| MD5 | 4d07e807a855be02a94c292dc66cb379 |
| SHA1 | 2d8d742a1179627f1fd702430c3ee106b72988aa |
| SHA256 | 6ccb02ca328a9df23d5f5c7ce58fbf7b9f84474c801230c6c42eab171ed83744 |
| SHA512 | 1576744a545abc7158525ec0e0e7930a7ed14016ce4d3ea157261e6be204a5e490937387718fe9b444f0d5ccfff866cd3426c1481ec31e293f59928d097895d1 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_lzma.pyd
| MD5 | 37057c92f50391d0751f2c1d7ad25b02 |
| SHA1 | a43c6835b11621663fa251da421be58d143d2afb |
| SHA256 | 9442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764 |
| SHA512 | 953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\unicodedata.pyd
| MD5 | 4c0d43f1a31e76255cb592bb616683e7 |
| SHA1 | 0a9f3d77a6e064baebacacc780701117f09169ad |
| SHA256 | 0f84e9f0d0bf44d10527a9816fcab495e3d797b09e7bbd1e6bd666ceb4b6c1a8 |
| SHA512 | b8176a180a441fe402e86f055aa5503356e7f49e984d70ab1060dee4f5f17fcec9c01f75bbff75ce5f4ef212677a6525804be53646cc0d7817b6ed5fd83fd778 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\yarl\_quoting_c.cp38-win_amd64.pyd
| MD5 | e96e99fc84249de9c4cd4649f3a27f7b |
| SHA1 | 4fcf885311d24a2ce438842bb7db269550709a00 |
| SHA256 | 3730432069213e61d347d65be318c32a81dfebc56397de6a900c0b71f2aea303 |
| SHA512 | 19aa039867085a5bba72308f514a614ba4703cc1299d6367b20d6ae7573f44a944f4ab46e3ea751e8a7bc63ebb97bf4fd32e60c480f31c4f9ff425725b690f79 |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\_queue.pyd
| MD5 | 44b72e0ad8d1e1ec3d8722088b48c3c5 |
| SHA1 | e0f41bf85978dd8f5abb0112c26322b72c0d7770 |
| SHA256 | 4aa1bbde1621c49edab4376cf9a13c1aa00a9b0a9905d9640a2694ef92f77d5e |
| SHA512 | 05853f93c6d79d8f9c96519ce4c195b9204df1255b01329deaa65e29bd3e988d41454cd305e2199404f587e855737879c330638f2f07bff11388a49e67ba896c |
C:\Users\Admin\AppData\Local\Temp\_MEI30602\certifi\cacert.pem
| MD5 | 3dcd08b803fbb28231e18b5d1eef4258 |
| SHA1 | b81ea40b943cd8a0c341f3a13e5bc05090b5a72a |
| SHA256 | de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e |
| SHA512 | 9cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5 |
\??\pipe\crashpad_3380_LXGGHPRMDXLSYJIL
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 05dfcf5011fe3956a867fedf570a28f9 |
| SHA1 | 8295f4060b38ed8c7276b791d5040105967698ae |
| SHA256 | b9f977f4dc1df406a626e226c0b1636a00781183bc0e8a84a56fe93c6176d531 |
| SHA512 | cb807cff33bb6fb9d8e8b23c52b6752a4b15db0de4f1f7aa5a0ae0c94a4a70b66d19a1c1da9ef5fa0760dee0e47b4c7655d12cf7ddffa57496a1a943b642b3fd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 76add268d0bd431964d7d0ac2f965195 |
| SHA1 | ff1afa4071cfd106f3685bb5783b89e22b509123 |
| SHA256 | a99bdc214b88d90553859950c44b6f626ed205abee663366728f8f4015efb6ce |
| SHA512 | 50d86ce522f457919a6138ef12344acd1fdd7519d8095d5d7dac83ba49affc1967e33975560791a7d7ecffe2e08061239f446c5dc239290f0b100d036571b49e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 3d57568635bbe56e66567e1dac3b0e66 |
| SHA1 | 0052c31051ef4d9d5b0a9f62ee608c36b91be0d0 |
| SHA256 | 0e694129a87f2bf4c9fc07acc150f7b25dfeead9daed710127afbf4aa994ddc3 |
| SHA512 | d420bf8454dfae2ce28f94389dcb6a8a2cfa4228ffa0ca3836a70341a9d508c01fd52a561453c19719fbdb125e6abc30d0e96883abcafaa9ae25de854923342f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 891571dee4059e760ab51e7dd391f12b |
| SHA1 | 95e2dad591b5738b8bc4dd40f384155e7c6d1212 |
| SHA256 | 83cb7dda067aa50d01407cb6e30ddd30220915d3523ef9449cfc638e61ad31ca |
| SHA512 | 754570b2f848922faf81fa4889634d0f277d5858996fdb09c85db7a6e217b354bbb8eb258b7670c912d7dc8660b224f74ae7fadadd3dad0b4bccc798171e80ad |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 49a6c2f9e54119a39a62790c1c6fc8b2 |
| SHA1 | 16d3ad6f329b2bd53abf39493f3b0c60dcf4f74e |
| SHA256 | 629706df802ae44cf64f87244846652e26e2fec32760b976033be94f6cd7fb84 |
| SHA512 | bcd0f42b224a5194f72915c99096064fe45098cb467eb28b4d59c0d082b0848e167e85eb2520b73dfdd4eefb2df955d58f16b50d9b1bfe7d208773f9789ab145 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-06 07:04
Reported
2024-06-06 07:07
Platform
win7-20240508-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file | C:\Windows\system32\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\ | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.pyc | C:\Windows\system32\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.pyc\ = "pyc_auto_file" | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell\Read | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell\Read\command | C:\Windows\system32\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" | C:\Windows\system32\rundll32.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2036 wrote to memory of 2620 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\system32\rundll32.exe |
| PID 2036 wrote to memory of 2620 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\system32\rundll32.exe |
| PID 2036 wrote to memory of 2620 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\system32\rundll32.exe |
| PID 2620 wrote to memory of 2772 | N/A | C:\Windows\system32\rundll32.exe | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe |
| PID 2620 wrote to memory of 2772 | N/A | C:\Windows\system32\rundll32.exe | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe |
| PID 2620 wrote to memory of 2772 | N/A | C:\Windows\system32\rundll32.exe | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe |
| PID 2620 wrote to memory of 2772 | N/A | C:\Windows\system32\rundll32.exe | C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\tbk.pyc
C:\Windows\system32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tbk.pyc
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\tbk.pyc"
Network
Files
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
| MD5 | 5540b6c6d4f266cde49f17c862558058 |
| SHA1 | 4a1fce051eab88d153b21afdccc7afb85d2ac433 |
| SHA256 | d5571449ac0eb3db854910fd6b10d4451b4ea93e2a478bf5f43abe3037ef9791 |
| SHA512 | 78e0fbe7261ce561e75b7e480a87add4721c28c09b8c5f094aac2efa40d603f54a1719c8794739d90d2577ecb957d3acc3ddce853db6a618f6f71f6ee46a2fa5 |
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-06 07:04
Reported
2024-06-06 07:07
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\tbk.pyc
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 203.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |