Resubmissions
07/06/2024, 16:57
240607-vf8p9abc8s 1007/06/2024, 16:47
240607-vag1cacc65 1007/06/2024, 06:24
240607-g52rcaag9t 10Analysis
-
max time kernel
515s -
max time network
1578s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 16:57
Behavioral task
behavioral1
Sample
TR4SH.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
TR4SH.exe
Resource
win10v2004-20240226-en
General
-
Target
TR4SH.exe
-
Size
21.8MB
-
MD5
1ecea7c2cadbab8e2d578df23eaa5ce7
-
SHA1
100a31e4b2df453709719cfd606b5ded63c648aa
-
SHA256
460bfc0c7f4f54283bc0a80db04c664a9c382dcf53d6a5876b0add1b0163d403
-
SHA512
d71a7f759d27c1620ff80abb94f6c9b556b23c02ee51eddbead221b0308f148f96adaa1f6c1bdcdcfb9231dbfd51810ea97d6496e1e15744614e095ac790e90c
-
SSDEEP
393216:ezQtsfh5+Kmr2pu0tTkQETS5vJQn+5PjDCA75umzTdrgDaMwUI6dA:ezQtsfX+Kmr2puIYQEW5hQ+d3fnJrewD
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1704 python-3.12.4-amd64.exe 1748 python-3.12.4-amd64.exe -
Loads dropped DLL 9 IoCs
pid Process 1532 TR4SH.exe 1532 TR4SH.exe 1532 TR4SH.exe 1532 TR4SH.exe 1532 TR4SH.exe 1532 TR4SH.exe 1532 TR4SH.exe 1704 python-3.12.4-amd64.exe 1748 python-3.12.4-amd64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1532 2932 TR4SH.exe 28 PID 2932 wrote to memory of 1532 2932 TR4SH.exe 28 PID 2932 wrote to memory of 1532 2932 TR4SH.exe 28 PID 1312 wrote to memory of 1752 1312 chrome.exe 30 PID 1312 wrote to memory of 1752 1312 chrome.exe 30 PID 1312 wrote to memory of 1752 1312 chrome.exe 30 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 2172 1312 chrome.exe 32 PID 1312 wrote to memory of 1656 1312 chrome.exe 33 PID 1312 wrote to memory of 1656 1312 chrome.exe 33 PID 1312 wrote to memory of 1656 1312 chrome.exe 33 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 PID 1312 wrote to memory of 1940 1312 chrome.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TR4SH.exe"C:\Users\Admin\AppData\Local\Temp\TR4SH.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\TR4SH.exe"C:\Users\Admin\AppData\Local\Temp\TR4SH.exe"2⤵
- Loads dropped DLL
PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72d9758,0x7fef72d9768,0x7fef72d97782⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:22⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2136 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1180 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:22⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3220 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3620 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3496 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3776 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2636 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2632 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2532 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3832 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2724 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4220 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1768 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1716 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1372,i,14122525110839100675,10985172985832850426,131072 /prefetch:82⤵PID:1736
-
-
C:\Users\Admin\Downloads\python-3.12.4-amd64.exe"C:\Users\Admin\Downloads\python-3.12.4-amd64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Windows\Temp\{095A0032-F09E-43FD-AE41-BB2930E7C7DC}\.cr\python-3.12.4-amd64.exe"C:\Windows\Temp\{095A0032-F09E-43FD-AE41-BB2930E7C7DC}\.cr\python-3.12.4-amd64.exe" -burn.clean.room="C:\Users\Admin\Downloads\python-3.12.4-amd64.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349497ff241d7f849d8d47f34fb17d1b
SHA1c2c6b11e9c9896dca493b6cbb486dde96b491210
SHA256906a29a2ce58e6cc6fa5c08b1cdf40e07c3d0ed13b74ff326a1b7c2e4f436b32
SHA512afa143ddd610c88ec1834f5d788806f8acb892f3b14e2d81e2d5d1615e25f46d922145df3d1be669cfc6578c7e26eafd048b0af01c1cb4f07975da4b1ae818e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5251882cfae53578455ecef3a8c97f5
SHA1baacae61b681c19571b1fd4d9e5a25a82b070a72
SHA256eb01d5b38f525ee1dbd5d624ce5f630b34f6490fe1f9cd543a1fb2adfa16d299
SHA5120c7a7fe01cc05efccbb0f9affcad4f7b491466b23966b37a4f8a4241c00202a8e870e38c832da4f913b6f5f2a0c5dbcc28adb6245d125610f903a624ba51418a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27944c9c43564dfbf126016ed732188
SHA1df4842690e02d689c1fcf6bc80af08e10f318d1f
SHA25655f57d97eae92ee4b2a79c75090caa73a956cc7f3e4e604e1c69c25528cf211f
SHA512e5255dd68eb6833279085a926f737324838bf197ecc489425ead8570c63b1ca02aa07b2268b720dcb5247e05327dcc0934469c213531c242654e73200592348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7dffb73d9b1b66a8fcf9039393ebb0d
SHA1225ae3c7dd9ade71e1401d713f3bf582122ca753
SHA256f0d46c3b90e30ca79bcadfa931c57603a24d4e39c9a4c8d29de23e4c2eff5270
SHA512cd81449539df9cdf0bcb094e23bdb0db6fb32616d9b365495ecc7342f158b4efa27a61646d1fe85889c3f68adaf2d1ce8e3bd90eaf9e785697cd19a365b32a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab106676999183d58741fb3ecfb61cae
SHA1226eb8f5bf408c943ba792d86be62085ffe7115a
SHA2561791856eb5e3c35dfe364605725acb2a8f3f0f9dd46f510cb1d2003ce3ed08ed
SHA512e340f06d46c376ce9208007caebb1d30033ca4c7f1bd8ffa15805b385773e23bfeebb3badbf16da879dafb655494ba85eb558f5b4bba58181b1a5da63409d60b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf766326.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD5ea26c8e543dbe6e679b003de97bc6a4c
SHA1b517c6391a124124821a64303a8c8b6ebd4c31b7
SHA256517b4628105ae59840c2c38f9191b0d9a61935f968ec876327ce7644b9d88f5a
SHA5125dfae5b29d2e772196143adce35472978c35a9256232e80b3c6aa17925b03cd9ef7a68b0f65e44525de2c59cd1e1586f3e6094c48350777b52ad6563c4225003
-
Filesize
525B
MD549b19e1f8c8e4ff97671cab9674ff6e1
SHA10ecaba21663f1486f229b6a2626b6dab0e9d75ca
SHA25602b9db3b12d5d22683a5a8830c9966f94536b4fe31716c9b65bd90c237c5f08f
SHA5125ba95c5af2d7d7d914aa11f110514daf8ee4b9e2c5f56500ae31a27c67b72c5e458025d712a1e0bad6db1f31b5720a9f921e7b4700c717fc23cfffce4092890b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c642860f-71fd-455d-836c-bf2514504be1.tmp
Filesize5KB
MD523f11ad5d8af1207c4bd6daad128537a
SHA173d5c8b152fd5d8630a0bd729d42ca9df3f146c1
SHA25600c52860ce7314d2640c0aa8ba5080a9f6f3d4e9e7726bc4e251bb6d5e02b4cf
SHA512c214dad62e78f8bf4a480c4be8454948ab502f7659088a8b0b708ac61ae3c31d11bec086db5d0221dd5f9cf4c5339bfc3311ee828f335e2e92f84f659976d6e8
-
Filesize
6KB
MD585c4d5ae5719e89c5053099e20a340b1
SHA1bc62d856077aadb74805718f8819d38384539c3d
SHA256380ee3af708f2203c62423b5509a4feb691ff5274f4568f6e5c09e3a20327b22
SHA5126d9a48053677b344b8604691123aa7fa23e41c79c33843c304981a6da08f385b9693556ffa036ce98ec2c832bf12782571193b5d50aee8f1f1c47d9fb860363d
-
Filesize
6KB
MD5c7c9e0101f008554d337417a6a5e4fd1
SHA10804044fe7b7f2cdf5cd3000fb2e620a8b69a6f6
SHA2564479d95dfe55c2cc0fe656e38779d38c2c10d074690e1830ff14c5f23a6a9c0b
SHA51217d11db40369bcfa5668b59f3d4f0006f206e7786ded5f49e173bc954541087ea663021f449e1a2b10c6ff87550e88a39eddb14010d16470e65ce234dc23ac58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b9006e59-36fc-4f26-8c8e-c07d0bbd5de2.tmp
Filesize7KB
MD55bc967cccd7bf4a0077c462499149c43
SHA1e6e902cc6e5534a8b901a91242bcebefabfdcdec
SHA256db4ecb290ed0e550a80d4b033b606f6411ef48b6d629e68c10f71c8e04403a62
SHA51255537f8335eaa16e2904c3b013541249b14a535ca3fb2ce875b3df5c3d147d028372f2af591c031f7783f6c79c4bc3969d635e66da8764b16d1993560d21a005
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
13KB
MD5b9207fe4f683b7bc99afaed15418f2a8
SHA160ff112e13e3697bef357415b7a0a98ef9f0b240
SHA25615e75e9622a17c6250c3258a2c0f0be5376275185a25671a44b18375e032396b
SHA5125b2af2ffda1b286a473d7d761b00dca08e89e133c0089bcdffa305002e6164f6ccf01448fd78cda2eff81067018ba5ffdd877480e655240700485156bec1ab97
-
Filesize
13KB
MD5f16e0d42f5294154d8cfce35cb74a599
SHA1e9cea591b5cfaa9a6f7b36ea554cf7e7c92ca74f
SHA256a0f5964785fee3289bfbc5d40e68740aa408fe2049a9a8bd328694e37d300a42
SHA512a14c4515b38a3e60155d4de9f80f3bb85c5ab63f58ad4a2f5abe6df18d35f0930583f17e837928683174e678bf1ede4cbcda1a2bb35aa489d80a9e1408e5f153
-
Filesize
15KB
MD5c9c74b664ec89a563b505df7cd1a43db
SHA1f82d8341b8962d6ebf1a9bb3e53400cf4864e0c7
SHA25639c5e4fa51ed17e2edefce0f6c0f577b52138c526a69b9763ce562618f959a5e
SHA5123f5aad204020b90102ad483c323850794acfae78902b9e7ec23937bbf66a95567d98b24720dc73eb1f443ba9284543387b5705ba3e0f40f90204eb8c88ec4c59
-
Filesize
13KB
MD5652a6e06056ef20d498d386ea710dea3
SHA1d85cb215bb33dc943065a025b810f51127d6196d
SHA256d5450dc00bcbe823627d2dc5074bb25f772cde65305d511698bbd518667094f5
SHA512cefd6f09f9a2414f0018f52fa4cde0f15d392075e1744f90cc506140d0f9ee2ff70e0c8c64a9adad376fce8b9fbc67d168a09a841343cf1973eae73316dca387
-
Filesize
13KB
MD5b81b677c1c3b76c07cdc41bbb2ea519c
SHA1cd581d99ceeb2e1cef863e4df7af213aaf70759f
SHA2564b4c5eb98253a7fd13dfae51b88a1d3afc364c310499c013703f0b7542d65ea8
SHA512a06ecebeb39b6d5dc617dca9b9d535e8cc6989f83ba7cfff0f7b67afb56076aaa47197aea0f5aef72ed8c46bbf44106b01b64849849e0d39a6615d9738f9a97b
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858
-
Filesize
987KB
MD50a5632da3e5d51ac53c58f965be121ca
SHA1b585d2b902214c45ad8072a9126c0d464d1da4ad
SHA2569f627acf1839cdf1b503080ea98f4da3e2e273cad7e6f07c7f64c3fd3a2563c5
SHA512c9991e18fd4685bb327b59d1fd5aa18973f10b67a01eafc3ffef72988caf6e5f07a5f4c56c9d485a3b733142152cbcc8dbf43122112f952f525cda57a8a56b18
-
Filesize
25.5MB
MD5f3df1be26cc7cbd8252ab5632b62d740
SHA13b1f54802b4cb8c02d1eb78fc79f95f91e8e49e4
SHA256da5809df5cb05200b3a528a186f39b7d6186376ce051b0a393f1ddf67c995258
SHA5122f9a11ffae6d9f1ed76bf816f28812fcba71f87080b0c92e52bfccb46243118c5803a7e25dd78003ca7d66501bfcdce8ff7c691c63c0038b0d409ca3842dcc89
-
Filesize
50KB
MD5888eb713a0095756252058c9727e088a
SHA1c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4
SHA25679434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067
SHA5127c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0
-
Filesize
858KB
MD5504fdaeaa19b2055ffc58d23f830e104
SHA17071c8189d1ecd09173111f9787888723040433f
SHA2568f211f3b8af3a2e6fd4aff1ac27a1ad9cd9737524e016b2e3bfc689dfdad95fb
SHA51201aa983cbddfe38e69f381e8f8e66988273ef453b095012f9c0eeae01d39e32deb0e6fb369363cbb5e387485be33a53ac3ec16d3de1f42bb2cde0cfa05ceb366
-
Filesize
675KB
MD5e58bf4439057b22e6db8735be19d61ad
SHA1415e148ecf78754a72de761d88825366aaf7afa1
SHA256e3d3f38fd9a32720db3a65180857497d9064cffe0a54911c96b6138a17199058
SHA5128d3523a12ee82123a17e73e507d42ae3248bd5c0aa697d5a379e61b965781bd83c0c97de41104b494b1f3b42127ab4b48ac9a071d5194a75c2af107016fc8c9c