Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe
Resource
win10v2004-20240611-en
General
-
Target
c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe
-
Size
219KB
-
MD5
105d0f2bcd9667e474c60be026298d6a
-
SHA1
589e7829ed8b371b1787c7952192fe13b257674a
-
SHA256
c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568
-
SHA512
2937cffb77a20a075538eeac63132b3fbcc326dcbd24f7ea020814b07eaad77ae9b8597399880a400cf78e0ed223123477b6a55acec0372f93a940c0c006dec6
-
SSDEEP
3072:42RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhh9K0KT:40KgGwHqwOOELha+sm2D2+UhngNHK46p
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 4900 avg_antivirus_free_setup_x64.exe 216 instup.exe 1676 instup.exe 3436 aswOfferTool.exe 2292 aswOfferTool.exe 452 aswOfferTool.exe 3056 aswOfferTool.exe 1656 aswOfferTool.exe 4680 aswOfferTool.exe 3376 aswOfferTool.exe 4412 aswOfferTool.exe -
Loads dropped DLL 13 IoCs
pid Process 3336 c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe 216 instup.exe 216 instup.exe 216 instup.exe 216 instup.exe 1676 instup.exe 1676 instup.exe 1676 instup.exe 1676 instup.exe 452 aswOfferTool.exe 1656 aswOfferTool.exe 3376 aswOfferTool.exe 4412 aswOfferTool.exe -
Checks for any installed AV software in registry 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus instup.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus instup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus instup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 instup.exe File opened for modification \??\PhysicalDrive0 c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe File opened for modification \??\PhysicalDrive0 avg_antivirus_free_setup_x64.exe File opened for modification \??\PhysicalDrive0 instup.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "14" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: aswOfferTool.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "88" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: sbr_x64_ais-d08.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "14" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "12" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "38" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "40" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "71" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: avbugreport_x64_ais" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "25" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: offertool_x64_ais-d08.vpx" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "9" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "25" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "60" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "100" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Main = "0" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Checking install conditions" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: servers.def.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "15" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "74" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: instup_x64_ais-d08.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "93" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "12" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "70" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "57" avg_antivirus_free_setup_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "DNS resolving" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "13" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "51" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "73" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "77" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "35" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "0" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "100" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "17" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: prod-pgm.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "3" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "27" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "87" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "4" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "61" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "62" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: instup.dll" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "54" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: offertool_x64_ais" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "0" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "30" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "46" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: setgui_x64_ais" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: sbr.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "33" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "45" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "67" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: sbr_x64_ais" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: avdump_x64_ais-d08.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: avdump_x86_ais" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "78" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "18" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "35" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "78" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "95" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "100" instup.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4900 avg_antivirus_free_setup_x64.exe 4900 avg_antivirus_free_setup_x64.exe 1676 instup.exe 1676 instup.exe 1676 instup.exe 1676 instup.exe 1676 instup.exe 1676 instup.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: 32 4900 avg_antivirus_free_setup_x64.exe Token: SeDebugPrivilege 216 instup.exe Token: 32 216 instup.exe Token: SeDebugPrivilege 1676 instup.exe Token: 32 1676 instup.exe Token: SeDebugPrivilege 3056 aswOfferTool.exe Token: SeImpersonatePrivilege 3056 aswOfferTool.exe Token: SeDebugPrivilege 4680 aswOfferTool.exe Token: SeImpersonatePrivilege 4680 aswOfferTool.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 216 instup.exe 1676 instup.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4900 3336 c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe 91 PID 3336 wrote to memory of 4900 3336 c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe 91 PID 4900 wrote to memory of 216 4900 avg_antivirus_free_setup_x64.exe 92 PID 4900 wrote to memory of 216 4900 avg_antivirus_free_setup_x64.exe 92 PID 216 wrote to memory of 1676 216 instup.exe 93 PID 216 wrote to memory of 1676 216 instup.exe 93 PID 1676 wrote to memory of 3436 1676 instup.exe 94 PID 1676 wrote to memory of 3436 1676 instup.exe 94 PID 1676 wrote to memory of 3436 1676 instup.exe 94 PID 1676 wrote to memory of 2292 1676 instup.exe 95 PID 1676 wrote to memory of 2292 1676 instup.exe 95 PID 1676 wrote to memory of 2292 1676 instup.exe 95 PID 1676 wrote to memory of 452 1676 instup.exe 96 PID 1676 wrote to memory of 452 1676 instup.exe 96 PID 1676 wrote to memory of 452 1676 instup.exe 96 PID 1676 wrote to memory of 3056 1676 instup.exe 97 PID 1676 wrote to memory of 3056 1676 instup.exe 97 PID 1676 wrote to memory of 3056 1676 instup.exe 97 PID 1676 wrote to memory of 4680 1676 instup.exe 100 PID 1676 wrote to memory of 4680 1676 instup.exe 100 PID 1676 wrote to memory of 4680 1676 instup.exe 100 PID 1676 wrote to memory of 4412 1676 instup.exe 102 PID 1676 wrote to memory of 4412 1676 instup.exe 102 PID 1676 wrote to memory of 4412 1676 instup.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe"C:\Users\Admin\AppData\Local\Temp\c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\Temp\asw.eecc863cc3decc7b\avg_antivirus_free_setup_x64.exe"C:\Windows\Temp\asw.eecc863cc3decc7b\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_tst_007_402_f /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /edat_dir:C:\Windows\Temp\asw.eecc863cc3decc7b2⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\Temp\asw.bfabaa787f845146\instup.exe"C:\Windows\Temp\asw.bfabaa787f845146\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.bfabaa787f845146 /edition:15 /prod:ais /stub_context:2c64507b-b59f-4dfd-839b-8d41d68a8629:9994552 /guid:84c21b69-27f1-47fc-9d8f-99820cf029ac /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /cookie:mmm_bav_tst_007_402_f /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /edat_dir:C:\Windows\Temp\asw.eecc863cc3decc7b3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\instup.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.bfabaa787f845146 /edition:15 /prod:ais /stub_context:2c64507b-b59f-4dfd-839b-8d41d68a8629:9994552 /guid:84c21b69-27f1-47fc-9d8f-99820cf029ac /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /cookie:mmm_bav_tst_007_402_f /edat_dir:C:\Windows\Temp\asw.eecc863cc3decc7b /online_installer4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkGToolbar -elevated5⤵
- Executes dropped EXE
PID:3436
-
-
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" /check_secure_browser5⤵
- Executes dropped EXE
PID:2292
-
-
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChrome -elevated5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:452
-
-
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656
-
-
-
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4680 -
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3376
-
-
-
C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe"C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChrome -elevated5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4412
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,7977653611488681184,6839495125838449898,262144 --variations-seed-version --mojo-platform-channel-handle=4040 /prefetch:81⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5d45fc9c860b24cad904d651f5ea35a3f
SHA1d8233a1c7e773d8cb7994806b0e4c4c986e8ab31
SHA2560098443dc5f5242035e0eaa1e418c70e8832a2f2cd29cbd581da647d5378ab91
SHA512407a64457a9297ac8b28c7ad48b3b7055a59afebe6a9c6580dd5b3bfe8049bfe27f099ead3e6fae3c5519483aa23bc80fb427e9f23914bf54d3469acdc030ed0
-
Filesize
1KB
MD5471b11eea34e4bb95854aae00bc898d2
SHA18c6278a3fbe04ce7bbd05f640447cce3c19225c2
SHA2568380145f8e604813c75ba11cbd919ed18af3b87307949d448d70936d8e332888
SHA51278a3bed138b7a14dc82769cd1f94ae42d4598a85ed8b67057d0cc0e43b1cedd4279e63fdf0495340fc9f372594f359e6cc1afcc91647364c782cdd432675704a
-
Filesize
281B
MD5622db09c358517b5b342c31ed2b65df1
SHA12c38476954751df44e54bbed724ac2203e3e5df3
SHA2564571cc909151ddb0a590acabd3faa672a0dcd8c49ecc4e1b0ec0f16eea095166
SHA51224335ea4bf1221a6c2d792817aa60707668f4be6a5da47c7c2be744b19ae0f8eafd630f95447c27918d75d8d4a76f54dfadb94e5d88665a83e16cc9baa41f7fb
-
Filesize
4.0MB
MD54cc6efda014cc654142c97cd09175e37
SHA19ff80f73eb8aa9563ee04f3857fedbb4167a9a2a
SHA2560ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2
SHA512064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751
-
Filesize
18.1MB
MD5e9134948a4db2642f9bfaaf157a18bd0
SHA198249d941c196e9ee01f5d77713f13a12fff87f4
SHA25667721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a
SHA512629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995
-
Filesize
3.6MB
MD5cb33ee6145c1dfad640103e1bc8b00e9
SHA1e68405536c9501a5f7617636db734a7e7bfdb61c
SHA256068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac
SHA51231608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b
-
Filesize
19KB
MD5ebd5c38aa827d9777dcde81e2a037b6f
SHA1740eee39569863c6baa780e7d82c848c92abe0c1
SHA2567fd358eddcef6756f315fec2bfad52286402f7194104fcfd3dcec7d588597025
SHA512fc22fff31b6e84297af9769b84142960e45bf9d8b71e9039e3829be9c671fc173dd47c88c25807f3e7bca0b87f842de500f5227e21ed312bfae2e89d0b65ff0d
-
Filesize
867KB
MD53ead47f44293e18d66fb32259904197a
SHA1e61e88bd81c05d4678aeb2d62c75dee35a25d16b
SHA256e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905
SHA512927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0
-
Filesize
1KB
MD52f4301ac41da3c8c865bcf0a2686246d
SHA1fe799dedf9d99c05e79e54539ca8c0e853f4cf91
SHA256584591ed817da7b6addff5b70ab11508288eab29c06e48f7d61d7fd861e5594b
SHA5128717af385c54f98d6ca9f8a054d6eed0a99608dbbf943d1d24007ee3ebc589e563d69e799e0c11e822e7328501739dd52752b0902c4982229387ba45df50d3cb
-
Filesize
4.7MB
MD5ebc2e21a31af7ba94c3a70db0caf23ad
SHA136a25c19c6becbcf8e1c959458867f59cab774a3
SHA256b1819bf1551be44e0f293f6b6ead1841aacb63ca3a9d90f1a31c9cb52f648c6e
SHA512e777fd82cf1d782e73dc8796c57ecb9be4ed09256af456190ae0e414de651226c3eb616ae4ec1c245e55934843dd85485e0594c0125e013c47b48d89fff5f739
-
Filesize
3.3MB
MD5c339cfe0485edefebae496b088d41221
SHA1684e4fa30a601ef645293cc5a8b008bbc03b9483
SHA25655ebd9dc7c26877a51e11722d3ea17f1afdf39a30aeda07ef6804659c34e54c4
SHA512c78b4735ed9184219f95a461e97a47d95b60f353ded28d692a72f9c3db2ead081b700731c8b673e8a1ca969519281d8e73cef449d5bb6bcfd282fcd2261f4a5d
-
Filesize
18KB
MD5b86dd14aadb9e34d004ad39a4693ced0
SHA11cb7775cee3e4106b2ddba89a0ccdc9dd547c521
SHA256b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878
SHA51203cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1
-
Filesize
18KB
MD50b575a6d40715ef6b6437f3d651365ec
SHA122c0e7f738cadb4e9287ce8b0ff75dd6781fc0a0
SHA2564b442e9da01b6ba0e1f53afedbdbc6aea667cb1fde4b47f5a4cb871102ee2423
SHA512bab5777b2a14edcc927d9a2feeaae3f76d4d670ab1ef4685cfe1f1432c3f058dcaf0c4b1b3c697c1e20698087d80eb549cf92ede68638cd2bf48b53a73a26782
-
Filesize
24KB
MD5209f5135ae4c7e8ff1f1948876c5ee32
SHA18c009e6864e653320b8cc62e65d890788d9a7fd7
SHA256ee62e0b16dc86b89f4c4801c531124190b2853c3333983289ef1d9b8ffd41eb3
SHA51201551c424195fb3cb1dbb014096c1b9c042ee196f90dfdb5d26a7130578978f161d7b84c71d73f1daa4fb6554d9802570c4bf8953d29d5f88eb9e486766e98ea
-
Filesize
696B
MD549e06bf9341fd92a249159483627845d
SHA1d23b7e1f861cedca0b1212935b5328fee3cabafb
SHA256feceb79022e6100df56347a6c86b1aab254bbe156f9dfc2002c013bf7b7e8ae8
SHA51299c7c4430fbec3d82b1c22d2a413d2d1a905ccdad4c03bb85a760b66e0d8f7ddba82db2f8463f100fc661a1a4dddc7a37ac08b77b5f9a4592315244fcb978df9
-
Filesize
2.3MB
MD5993a67fbd5162510a2b0f3fba05bad33
SHA13c76258240a04c05341e611f55bef10341e34ff3
SHA2560b7c3caa31928131ce0e1ca570aa72e20a98dda13e4ca0c59f31cc677d8e8c6e
SHA51244a335d3db00fa9148066a5f2d2a9f5250d7df2315d132ab2798b02e2d21b700525a00be91d960e1564a6ffc0ee95347f0df9ffc27a10cf807d5a926ab5154a3
-
Filesize
211B
MD5aa442786f758e5ad442aea88d6cf6124
SHA16c464722d20d261a155e2c5f6105cd8a4f0e5c21
SHA256ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b
SHA512add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f
-
Filesize
73KB
MD5d264bf74d7ffcbad341d9fcefa4893bb
SHA1c7e9a0972524fa573825865c46eb6728d3e219e0
SHA2564b01a68078d7e1af1c0197baddbbb1ef4d3cbf13f71e8b9df766f88b4e6d8025
SHA512afbfdf6fdeb5dc427340de691726e79cb5bcc41bd488c557c684efe3f26d83a17f1118cc50bd64541a9a839d3dd4329a72a9423e65d3e9cdcfbd14003f1e0dc3
-
Filesize
4KB
MD50344288a18997069003d84c226a168f9
SHA10fe47920601834e620737ad321fbb24d38c7ee94
SHA256675bd92f752a51bd7d9797895252b3130095a06d7d5db8f221ab6251735ead8d
SHA512b1680ef42d7e2e56fbb124c91da27f15e6c946450c7d03d95b937c3cde80dbc2260e11926578075df255058c2307058429fd2f7307fc0a105c775a9b8aa82429
-
Filesize
7KB
MD591760dd268918f34d5035b70231c6662
SHA1c244a869726ab00bc674ea81970ddc739f240426
SHA25660cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a
SHA51230f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6
-
Filesize
572B
MD56d08ac0131cac7a2f9f2ea5d9d0b0cc6
SHA125983c1419089c6a7570963dda2d06e022b3b36d
SHA256846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f
SHA512753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c
-
Filesize
343B
MD5b516373c4f4f0bd98bbbcd71b4022e4d
SHA1fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062
SHA25652e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099
SHA512b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469
-
Filesize
340B
MD5a6aa5195417c52019dac2ea520161d70
SHA13867f26e50214fbef5698dcea3840ba6c35ab23b
SHA256b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92
SHA5126986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50
-
Filesize
27KB
MD52b62fb1ecd174c7e951f2b8af502c1c0
SHA190744a9355dd5b74d2ecc7ee34fccbeca1c18f1b
SHA2561fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67
SHA5120f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0
-
Filesize
1KB
MD5ca027a5ef5f6d21d7e42855fa4db4120
SHA1eee669fe1c3cabd5f96c65ac992e4851f8eca9da
SHA256e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d
SHA5128dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491
-
Filesize
38KB
MD549474897d267894daa13e9dcb168793d
SHA110331de148bb89ecc6e1af25bd3b0a862dd2b4eb
SHA2560b9aedce74468150c054d27649dad8f98109e537a581649be6668a13cd29e6a7
SHA512687dfcfdff27d8be7fa2b7a277a6bd269bf719ca12bf5e7f38643582785032cb8b0e11c04180736dfa56c2b10a12e10c10e50427ceacf6d6332125ebf65eb9da
-
Filesize
29KB
MD5c53dc6d8050e08d12939b95e2f5c53dc
SHA101f3fd1a4c730cad939d243e6bb8f9fe8f1e0138
SHA2565a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece
SHA51275ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a
-
Filesize
16KB
MD5bd33707a5e0b6cc434fbaa32e69cb30a
SHA134ddc8fbda6acef9e07de571d4c00e65e3c09958
SHA256bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036
SHA51202b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de
-
Filesize
9.5MB
MD572c1cad77d7a37f6eed6606b00b22738
SHA11883d039f42ead5318de8f5f37b61bad4b61fa72
SHA25647cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3
SHA51287104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209
-
Filesize
21B
MD5b7a649f519bca7f8e5186aaea02b48c9
SHA19a1e5074bbea1693659a70c85ef8f66e20a97422
SHA256d9defeae2cfb91b2871eaf62bcdc2b0e2390de6ba02343407dd658e37f75f543
SHA512dc033fc80e06b5013f85f5bda1927421f6635d85bc85d2ae7a5694b69e4bb14e50d9320a7963bfabf113f9e0e58cd6fd1442dc3530335ea3908383e36e2dd506