Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 09:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://shinolocker.com
Resource
win10v2004-20240508-en
General
-
Target
http://shinolocker.com
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ShinoLocker.exe -
Executes dropped EXE 8 IoCs
pid Process 520 ShinoLocker.exe 5440 T2Zn809V.exe 3496 T2Zn809V.exe 696 T2Zn809V.exe 4144 T2Zn809V.exe 6104 T2Zn809V.exe 3100 T2Zn809V.exe 3200 T2Zn809V.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JYakkIBi.exe \"%l\" " ShinoLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.shino ShinoLocker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\ ShinoLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\shell\open\command ShinoLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\shell ShinoLocker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JYakkIBi.exe, 0" ShinoLocker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.shino\ = "ShinoLockerEncryptedFile" ShinoLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile ShinoLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\shell\open ShinoLocker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShinoLockerEncryptedFile\DefaultIcon ShinoLocker.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 553642.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Local\Temp\JYakkIBi.exe\:SmartScreen:$DATA ShinoLocker.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1048 msedge.exe 1048 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe 6132 msedge.exe 6132 msedge.exe 5440 T2Zn809V.exe 5440 T2Zn809V.exe 3496 T2Zn809V.exe 3496 T2Zn809V.exe 696 T2Zn809V.exe 696 T2Zn809V.exe 4144 T2Zn809V.exe 4144 T2Zn809V.exe 6104 T2Zn809V.exe 6104 T2Zn809V.exe 3100 T2Zn809V.exe 3100 T2Zn809V.exe 3200 T2Zn809V.exe 3200 T2Zn809V.exe 5780 msedge.exe 5780 msedge.exe 5780 msedge.exe 5780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 520 ShinoLocker.exe Token: SeDebugPrivilege 5440 T2Zn809V.exe Token: SeDebugPrivilege 3496 T2Zn809V.exe Token: SeDebugPrivilege 696 T2Zn809V.exe Token: SeDebugPrivilege 4144 T2Zn809V.exe Token: SeDebugPrivilege 6104 T2Zn809V.exe Token: SeDebugPrivilege 3100 T2Zn809V.exe Token: SeDebugPrivilege 3200 T2Zn809V.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4952 1048 msedge.exe 81 PID 1048 wrote to memory of 4952 1048 msedge.exe 81 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 2120 1048 msedge.exe 82 PID 1048 wrote to memory of 1912 1048 msedge.exe 83 PID 1048 wrote to memory of 1912 1048 msedge.exe 83 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84 PID 1048 wrote to memory of 2092 1048 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://shinolocker.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb260146f8,0x7ffb26014708,0x7ffb260147182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1700 /prefetch:82⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6628 /prefetch:82⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
-
C:\Users\Admin\Downloads\ShinoLocker.exe"C:\Users\Admin\Downloads\ShinoLocker.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:520 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" ping localhost3⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\AppData\Local\Temp\qMAt0i.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\Desktop\RestoreGrant.wmv"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\Desktop\SelectGroup.mov"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\Desktop\WatchMount.mp3"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\Desktop\EnableMove.doc"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\Desktop\ResumeSuspend.xlsm"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe"C:\Users\Admin\AppData\Local\Temp\T2Zn809V.exe" E 6vNOOM2ilPA/xF/TzuXlvw== V58cXQGtggvxlZ4f7fWUww== "C:\Users\Admin\Desktop\SyncUse.xlsm"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://shinolocker.com/?h=20445&t=V58cXQGtggvxlZ4f7fWUww%3D%3D#key3⤵PID:4984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb260146f8,0x7ffb26014708,0x7ffb260147184⤵PID:1276
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16863821383616787559,2968987491391857254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1696 /prefetch:12⤵PID:6060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5fb350a49c90a3004b7a55f892c02711d
SHA1ccc64ee9b27218196bf7c906f7ba41e4f604a361
SHA256ee8e68a0fd32e14640c8b991c78ec8d52963916c5f01c7e42068af6dddd2e218
SHA512b33c473130a3e5a46f2841df1c6ce1ee366d4192deb4856c1740e79badb6601aa8ca8e056b77fe3bacc3530c3794e9986c7783d8876f756eda16eca5b797c0e4
-
Filesize
342B
MD51ec1427550351bb2214734c3a95d6c58
SHA1c63cd3a9d621f920abdf23f81d6fc9daab1b2f4d
SHA256ce7440ae6dbefe30761e8400ae5f6d10774ebed5d11000fb4f9437c1af4ab280
SHA512fee49195cd32e3ffe6dfdd3356e2dafc30504d7e20fe97e548fd5508680be8a9f600cfd481058831547bf6737d9ea2087205a4c0b1cfd123abe3749b1591641e
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD51d14cd27a47ffaf2e49d8cefefaaf7bf
SHA1c783383c72b5e35abbfce80b12f53be7d4a6ebe5
SHA256b464667421a316ff882f04f94ff5c8c89aad71344f72eac9ca8be5f8bb4f2ba8
SHA512b9b2ef1db26e6691b2e63b7a128c50b744e6c7eb44637618153424a856ecf3f1aeea05b471f32b33a803b9215414e3c067b6ddc700d61b080f02095aa3dd8408
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD54a3b6683c1b255ec14f2bc14c34d9b48
SHA1bd2092068632d8d2ba3edf9e0442ca07c94a0ea0
SHA2568586081e47786821723277fb8762ae53d277526b33cb11436b06a8271a2eba18
SHA51200bdcd5eb6cf9b2ca51ec1b618ccaf55cbdcd65cc16d5cee40601f3b2ff45d0dc56f20e058ae343e06c3891296ad80a4a7b955521deb94091e0dcf9cd1fd431b
-
Filesize
2KB
MD5eac97fa36da435e0e1975dd70c6bffc9
SHA1d1d4b5f258f177768ddd8e18c4832a71dcc144ee
SHA256f293f230f4e82f0b61a32146bf5925b11e15e32f7aaa8c51ae432127c91e62d7
SHA512be43a86a48cbae538983613618680936b7c596969113d5ae793738867ed92ebd0834639a0e21580d609484f866f103ca1bfdc5954d9730f9b1417dea651c951d
-
Filesize
2KB
MD5ac63a282aef012f7670d7b95c35a3357
SHA1d5b87c94e118d286de656ef662bc1036932dcf11
SHA256474e4594df8ff214c6403197c0298ee76dd510126d305080001f26346c7b64c5
SHA512b75ac6e70569522023870013908959b411928bb956744f3f0f1923ceec35b5d0c149da058f2e723668f09219427343b0f66a427d5d5fe304ad67e144d3083491
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c1a7d88a70ed5a0b0f9ae2d65fe9b8f7
SHA1dae2fef0d4a2bd638db2be27e66ed98fc7c6bd3b
SHA256f260b8abe1c74b8346c1ab157b024a14ad2d92385b9d754bdf55bb4025253541
SHA51222bf1804b82ec0cfa0140c28bec60443e2cfa7e957e78371b847ed7475e5862584147ec0ddc6375535e0576f28ec13342c6c0b8dd611a3d9e56bd0015153d854
-
Filesize
7KB
MD5476802c5b5ddc5dd2d1fa414027012e3
SHA1c7c6a56f11f406f78a0c2480b1cb9f2ff098c4f3
SHA2562157a7eb868267929fc2accd5b943ca99f95e538f9ce35572be93a10e0089ae6
SHA51238dbdcb5fbf72c21f9ffbcafa4c949adda9ed86e812f71dc7aa849e0b268252b89c9c50c5188ec92393d540d791e6b3b0be950685fcfd862a0549b4d39a312ab
-
Filesize
7KB
MD595d36fac2d0a316767519875d7e5eb9d
SHA137a0aef282314dc78723120607ac51948da424db
SHA25690d6afd31b2992a59fb271c6c7f10789ff75b29d2105b87d07a65becca69fe7d
SHA51250b64287841daf99ce03426ee7ce8630cf2780e91a2a74d8eb7632ae3c2d4b78d75ebcba69b919d20e148ac6f7853c75109155fa73227e06790da75fbfdacd1e
-
Filesize
7KB
MD5a0f542c6428335f843eecdc01f7941c3
SHA19b4fec5c1b1ba82b67cec0a8635b7676b94366e3
SHA256b43c2fae3b12dc02b57c79c517e971f3ead702225d5df339060f67d868e9265a
SHA5127f8eeb1c12ea9687426882596df085746b8bd973e332fb8433466dac5f487c3239063c740a08660cf0ea833cd2ff93290410e2dc08e1b6c72baacc0b98802464
-
Filesize
204B
MD5d76c7d6905d2ab93dba363c1eb28559c
SHA1c343786584d7493cda48c203ed2bcbdf4bd26292
SHA256007549bbf831ba9f3a1758d3dec7f78b2785b52db5a32f607c480dda43090a98
SHA512c4454fe91e206aa38167ce40c6e9f48b439f7be48006f6f2fc1c8a3d77d40a1258d45be61821fe8b2b107cf591fac4f97841c9cdfc448915d28baf686f9f5d98
-
Filesize
202B
MD5b521055f56fcb7fb24f9da9e3b086bab
SHA16eec7da671d61f05961e93084a11ec70062d06a3
SHA2569f24b1ab9ac52e503fa5b7a67b54ae91f7aa553af889fa4c4d3f790eabad8a0a
SHA512e4526e064018a79f1c170ddcfd263496c50e3f32cbe1bfd7f6284c7a12ea9d369ba514d8565f37efcfa22787bdba554ea49cb057b356b1b6c2930fb26c3731a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5029ad09d072fbcfbb4d98f2d8f279076
SHA1d4accf1218d29a0c950bba899f88dab5c333ce0e
SHA256bf309439e766daf4b3203122ce27dfa989e224c14c1a7fc674e679c852ff0eb0
SHA512347fb2ecc8f730453351eab307169fd5809d480659976257dad197c37bd7a131d477b00923b96e7110f95fabcba63f28c05c74316d7f4c2470c82334f4b5b3df
-
Filesize
11KB
MD52757f3a0c4fca905369df9d836e86230
SHA1ea45e74e795a7dab85f75cbca331c562d347b7df
SHA256158bd47baac810ef8694d888e1fa05053774c4028560f037189db2296ccd35ef
SHA5121b8767f51010c6d108113d6124cb3c08835cb565d1219ee7929feba78bc336badf218306acea6a1f7fb7f05d51fd27affd3e242096f2bc515dbf5b4669af7ff2
-
Filesize
12KB
MD5d16506cb4114b16a50266a0f6d8f6eba
SHA16009e706ed1d34d0d4ef272cac399e282d665e49
SHA256908f66728066d00b23fa3982b00bae24ff3e143038fb7bc9a24102281c7c86bf
SHA512c318a39af5be3faf6ca0911462ed2e3aa897c0fdb1ef3b1ed50871f3bbbfe1c626a188515d55f75cb4bffc3c91a85da93836ea6f92d39d7704f2da51a9f9a7d5
-
Filesize
13B
MD5794cb76709a319f4e739cf264d7c90f6
SHA17134553b255b89a25aa04df0e4a902d26ba33263
SHA256a87fe9c5bf75b03890a2cb71e3390677ab70e6f36167045125da9624adb2a464
SHA51240ca8f859ea46576159012d488c23b75860e7a05e3dbe04f904c5da33697976a35ecdfa929b35dd00d1abb33deaf18c413ce5b989b2efedaace19ec211e53247
-
Filesize
192B
MD5441d76ca4f4fd221f5e580426618b45a
SHA1fa56e32fd9862ec006988336066d790d99ddca00
SHA25609f9018ad24dd75e2d509e5baf2b944ea87dca792ac1a0cba21df43521aa5c5e
SHA51244c6f64758c910b65959306e48cc69802b41c7b4abaa8335a53b9452a0a5002581b973c01fcbde8486b5b6fb112fd5fa2e864ac2678e4336e87397703909756e
-
Filesize
276B
MD588533aec61a24f19272c04485e6a2faa
SHA15023c6a70df8e0e21a071488d34e6b0d566d6b03
SHA2568daec4587051e7783650b8c5a89493985fdbf20e9b57ae29b261bac519300602
SHA512d1d8e93f5243eb099e9df582893b08bbb4e1431afcf59a1b31b42a61d1ebf081c8dea24087e6e6541d138caad978bc1308e348e6f3d052a9a7b8215878e7679f
-
Filesize
12KB
MD5c139b1b02df2bb767206a8aef33f20dd
SHA1f577d8bd839161bf5101afb4bc553d1cdfeee7c3
SHA2566aef2a20079a06566bb57277e587ff6de38a92f7c7feda0fb341cfaf3aa13834
SHA5123d1b824467b21261cef637982a101f4bfa4a12d540744373d7a18cc489069e9945bffacb663934e04f30bec9ff638bb686f894e797ea02517892bf83b2ba0d4f
-
Filesize
10B
MD54c0ff61e3b0f370d08d588a02bbbdaa2
SHA14f14111783be8c1e73d020658c84139b495ba906
SHA25644dca85d33916d6f8f425226a26d0c28991fd3528ddcb415c1f801a23c30c241
SHA512065c12d2a40664e6b9c14d0072c7b584e573979c298c64b0122ee1e01f457188a4336ab4108e61ecec9cba478fe73e647162fc4ec8a39b80330c64a275babdd2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
943KB
MD5b213e1886311f288d21babc4882fd2e7
SHA1dcaa48e831c46637a562d317326ade2fc935562f
SHA256fd8768ecd3285c4a7de49b11c814a576ae521b4a67fc61a3cb9f9637dd751b12
SHA51217929438a2c13634a7c5b9d51137bb9837ea844e3a495f1acd3e7b3da8a7726affd416d5aa22730aa0a04461230faf1e3ec3126b074b568ad9240143d9d75afd
-
Filesize
769KB
MD5a00bcb414682c17d2dbb3aa351f12429
SHA1eaaa983101036cca235929aa74b2599b03df0c6f
SHA25660e050a0fa9ca0c06b0b35b08b5cc58f35dbb38d0851198147a5ad4a433d5e34
SHA512e4000f05a255c993a4ff69b5aae95e7ee5ee5fb4daab7a1398345d2dd7d4e638f8062d74ad3f482681418c305ad988add13442a0bc1b6094831aed5f2e84b09f
-
Filesize
1.3MB
MD5b3f30fb07a7fd3166a585ecd0871a5a3
SHA193bb8da5e3323b2dc541e8fd3a9accc5e889f407
SHA25696c2e3a93d441e0eaa07868868acd05808bddd217a1dfe95e3eb255c6ca498c3
SHA5122973dd3bbdb9382af41e8392da6cc1e01cb553ae4086ecf07d2ddadd0215ac45879bf8c3222bf67b16370ccec9525947cf0ea0ecf78bd4c1e02c9588dc4ec940
-
Filesize
740KB
MD52742eda777d2696e9a25242e67c3a6d9
SHA10aeb5799a15af477c96b979d8d4cda28bab993ed
SHA25618196bc49ae543fe0df5e226856809c2c652581ea5553b0d728724d55f035884
SHA512bb9d885e47015b3bfc8324e156feaa0bef724eee149f26c36e64e7950fa7f3a3897fbf83a871f98f4e351c9b673b7716c4c64369f030a942712366a2cfc703fc
-
Filesize
508KB
MD5b9cf924c85a7d6efceea2eaa29de0faa
SHA14931b6d90d8d56ce893f78d4280aeb264ac14a82
SHA256bcaba4ae47fa9c9d0de2f5314b59f446f9d9dbf4de355145a4c272cfce4cfd7f
SHA512a2d847446a0b0081280c7b13627680aeff76afc56a8ed8a7d28c16577f9446186b906bf3c90d5bf72a67cf73d9aada93285376a1633e12729f18198368f5e7ab
-
Filesize
362KB
MD5098f5afc14d2755ce0cda19dbd20f36c
SHA11e0568c3c9f9940865ffd58d0734705dac4ec4e9
SHA25623a66b1aa6f538763c760e70baf7184309a5b41c23ba016969461c435fc3995f
SHA5128ebd06be8382a097495a48572aa893fd969ebc960874c0fff2c7f241ac1632cda3a0b8668f41940393e43fcf5326587eb670a1d3daba9163df8988327a0753fd
-
Filesize
190KB
MD552922fc1720fbe574c695a51899ef773
SHA1682efe9385c6cc80364bc3d1ef721c86544c3332
SHA25652b781a7d7d3db3706086bc6ee9f126f28243aa34f443775d0341de189c1d11a
SHA5120c190a96303b90cd0458822d18dc3698d68ddf1454f3878f7b6bf7dde8904a7f3b5e5b79130485956e3ae494b83cc062978acdf04a975c8acdec8cbb3e6ade64