Analysis
-
max time kernel
102s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 16:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mystbloom4.com/
Resource
win10v2004-20240508-en
General
-
Target
https://mystbloom4.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626832233955905" chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 2248 msedge.exe 2248 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious behavior: LoadsDriver 14 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 648 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2248 msedge.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2248 msedge.exe 2096 chrome.exe 2248 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 768 2248 msedge.exe 82 PID 2248 wrote to memory of 768 2248 msedge.exe 82 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1556 2248 msedge.exe 83 PID 2248 wrote to memory of 1468 2248 msedge.exe 84 PID 2248 wrote to memory of 1468 2248 msedge.exe 84 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85 PID 2248 wrote to memory of 3928 2248 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mystbloom4.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9053046f8,0x7ff905304708,0x7ff9053047182⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4304 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11017889814866651629,1251686377581587018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f2d6ab58,0x7ff8f2d6ab68,0x7ff8f2d6ab782⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:22⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3580 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4804 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4408 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3564 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5068 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3448 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:6120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4836 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3404 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3412 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5260 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3428 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4348 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5472 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3912 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:6084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=1548 --field-trial-handle=2012,i,15345993323702532978,11679492493553102279,131072 /prefetch:12⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5aa9441cf714cf337ae35d67fac4938fa
SHA1b129e62d725bb0ed8282ae259ac05df54342062d
SHA2569f2fdf422a9536f027cc622dd6f3c4b24e6d8d1566cf7ccfff7b56cc7fc7fb93
SHA5125aa77c10df75fe9d2a1b6e2589d7f20cc6de10c5b407077db6c0b0cc41383299082993d0624bf3eae0af0b9eea2973134bc5b4a8a854097e125237a363165f49
-
Filesize
811B
MD5f82d9f02cca5b4d0b983ed66514c5b5a
SHA18e76899847622ad00117fd286c5e23e961635883
SHA2568130d95f171b79f079a8b4ae96e26aa924652e3e9d72782c219da3c40252bcb5
SHA5127023184b457a4d89d2677643dd2f327724a8321593123b16c6d66166fabc1ee126b2dcbb73542622d24476dfbe032aa958b3736f26d43353b19ddbe9475d968d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD58638333c197762195a7e6499383cc843
SHA1758d28bc21141214bf48cb50ac09e5419caf5e14
SHA25627340a0013d6462109f386f4e7f3f8409dbb6bdd1b1f029ed06f5956de39b306
SHA5129313522cbfb06318139159c2a129155ae4b20bbc659f3c7880c0448dcfdfc81801b3151b869db7d66c4be0458c913fdc1e3a0e6a551d4697935696a423b89ebe
-
Filesize
7KB
MD58a35c8724fbe330855c9a51896842443
SHA17e6ef92affa27aca2663a98c2373aa4e34f4cf86
SHA256b6f5dae6cda4f6dbf4862b9b78dbb5c80f1a352db12949c5bda10236b138c9ef
SHA512b75f98f6140be6b8ca84641862ffd19c098812908c1356f7a7b695ba61a8501d3cd63923dfde076e7e4a3e023ed9ee85e662a01d77baec37c69f41a1a0b69cde
-
Filesize
7KB
MD57e7fd1de8aec72268d278a1da8e4a16c
SHA1b81494005d414996f70b5182f7f75e29691247d1
SHA2562c4ca947358d403ba154a5a066b5e25070e9d0eb3d97cafc183151b62505da9f
SHA512c8924d93275b6bc4c51aa889821f007e3bb95e593a8c344c3d8e275c88c928ad226d5f8a29d1fef9248efe938797ff6f716349e165470928cb79f0f1a6076695
-
Filesize
257KB
MD55a6b828ffd235b910f3004e78320048e
SHA10435d0f80398a9712c6a43a67b899afd3e303e97
SHA25662521de4ac42b4d8e2e5f8f30904b90aee2422f206f7eae0f7c599ea211c9ed6
SHA512b2f30658bc24505298218533ae79814ad15b3ae8cb6bb3f403ae714712d51f00205eeb6afe06e858d54e2b90b317f71763e0d1f7214cc4129be5745e8b91795e
-
Filesize
309KB
MD5d2fb614c062679a9ac93e5c6e500782c
SHA1b068cb3711b8deb3e52e00c1d9ded7cc88788af1
SHA256c9cba85e4a5f8177498685a03722d43fe6afb9a623e99899dfe18200613eb7b6
SHA5123f0fcee12c08a13a062afa5725590efc3f11d6df06dfd3e154870c821b7bf9a85133aa4aee52cdd8d806e0b8dec22e7789fd15f57772f1c84817ff1ffd4c468e
-
Filesize
313KB
MD51193033b6eb33b0927c6b958e388280d
SHA13e4c0f0610977fd7c1e5cd1e6ad1d70438414a7e
SHA25637de48cfc600c1eab90a2d7cdb89b81ce637e654ed6ec0c2723bf7df65647ef2
SHA5128df189b1b8230627485d5068f21fa83aeb7c7036d4db062ebace869da302041650958e256a8fe275628f4d15cfab7d67e2196ba223bbc4d1ee67828f7ba9c451
-
Filesize
91KB
MD59351ef56da64b554bb11262c623ef6f7
SHA10eb2c3d44bfb1fb9c678eba9c1aa6474c27d93b5
SHA256a35c9e577da9c7862d664411a33cd20de2664f82fbec2c09a1644a6a66de0109
SHA512127e4b16773d4be22b8499093166ecaeeb3e190859ea5c6fc02abdcf64cf4e9dfe542f6d4c84e3661622da43e0917e621099e8371029b1b57b1e853c773a6525
-
Filesize
88KB
MD5d92faf5d6b362e487e881a0e6c1abd84
SHA1794333b0ec3fe052c95f44cd84d4d8294a6a594f
SHA25638aad592671825a56c78318743f7c75e1b751e36144bf8161ade03470c47f777
SHA5126405cdb8790ff6114ec0882e85b021f24e59046ace8c9bdd6a1a5b5721a66a1ac9d196dbf9c4a967b074c495ec94fd6cd4442201d28f0eac938857caf2fd3813
-
Filesize
264KB
MD51c9ac91fdea3303c3cbdc7e7b698cd34
SHA1bdb801e5562673d45e46c1ff5cc935433d73fe64
SHA256c12114a59c620d3f1fa55b61bdf05b95b20d66e07c87c3b2061f658dc3ec5255
SHA512baaf38e976d2812387d402e43e9aebd5573c632181fbf0af98d8717c69ec219046552d081df00c06016c1a0877c7462b334b124169f13161cd137639830bdca6
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD534528800a63878e5048d7dc4b0e64b65
SHA1719900bb75db40e4116e83c6d0af25554d804d97
SHA25634d648e58f6a2ddc6022cb8cb746b27dc827b34e929de77e049d97e83d29bbb1
SHA512cce336b972eb23cacf09ce9d71137cd22f7d2f29979df51aa97e88b1b281806297bfaa5d88a5cc8588a5530fa76347f9d25691806d55643279ef40f1e48604e0
-
Filesize
6KB
MD520c739f0639399cb10587aad1b9266d0
SHA1b93a0850261b4a85299283ab53cf2a9ed414c7a9
SHA256f9ed3fa1bd41acf1968ca963048c8da7a68a5b650ac0bfbc5346f1a245d71ec6
SHA5122697b05c80367f3c3493e4ed76b7fe8ef1c4391ca1740aa0334f023f6a37a43e22926c2146d6eec77b39e09e2961352de4e3ba711d11c3cc90b5851d61ed045a
-
Filesize
6KB
MD592ef255cb48bc9d0241fc6bb9faacbdb
SHA182d4606f378d38f0b890e76b154757c4298d966b
SHA25689907b9a14448cf4ab6f0486d01fcdae42a16a357546c412fac0717f85d73fe8
SHA512dbc94f47827ff741f2c2a7185eb12a4fee801495e5157a3985cbfd5f2212cb9a4f31e3eb2b7a772c41e8f1722f3db111d589e393ef17c1ee7fc4ef47d483c19e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD59427c5690d6dac940c8b4b883541af15
SHA1f5f4772478500e72248139d6eccbad69a5d4ca44
SHA256072f2d1e39851287fdaebf85b244c97c9857701569c463e777994c33448f1f98
SHA51296e7cb998db415aace9c5bf3f6051374bf43046c5872afa4eb6db770a5fce2de51b91c4170f337721a3f9e45a45b2f3c6082e51b67ac01d1651e5f0f6cbc64ee
-
Filesize
8KB
MD5ea19a3a7b6faf3def6b717d042a57205
SHA19a1623966bac5328fad825bcc73c70129c5c10c3
SHA256c872f70755d2a1cfe607f3b4e88395d3909dee58de6879fae28945367ccbee6c
SHA5121f7d59004f2d1153c7515413c6b430fa75b8ba284317d5b881cffbf3572134624d0709adc35a91e52afd274e7d63189b3320eb3c9e8692a8051935f6b9e204d2