Analysis
-
max time kernel
1799s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 00:56
Behavioral task
behavioral1
Sample
net-filim-patched-noencrypt.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
net-filim-patched-noencrypt.exe
Resource
win10v2004-20240508-en
General
-
Target
net-filim-patched-noencrypt.exe
-
Size
70KB
-
MD5
712ca5fea2fcfc38404ba349eb697c06
-
SHA1
9dc61f152068231c043b25a3f860331974a94e68
-
SHA256
c6e0f4d9bf7a2203935fa8a248de934a248010938934222fccdee3d87a26fc77
-
SHA512
6d77e763d165d14d0ea4b49d7fbf3d5c69b0b8312ffc66a0a9639942c56b9e26c6cdfbcf0fdbe3e17c324bcbffc28b85b23336a305a8f83071da8a3db5959435
-
SSDEEP
768:lXSzkFWTBhyugDC60CPJkEBx9w7mSDh3vkkjvshT3ED18nv04ZPqpb348Uq1krHE:lwMWV3gDCk6EBwT/kJbvkbuq1krj0x
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
net-filim-patched-noencrypt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation net-filim-patched-noencrypt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3112 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133630594986990233" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4108 chrome.exe 4108 chrome.exe 984 chrome.exe 984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
chrome.exepid process 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
net-filim-patched-noencrypt.execmd.exechrome.exedescription pid process target process PID 384 wrote to memory of 1000 384 net-filim-patched-noencrypt.exe cmd.exe PID 384 wrote to memory of 1000 384 net-filim-patched-noencrypt.exe cmd.exe PID 384 wrote to memory of 1000 384 net-filim-patched-noencrypt.exe cmd.exe PID 1000 wrote to memory of 3112 1000 cmd.exe timeout.exe PID 1000 wrote to memory of 3112 1000 cmd.exe timeout.exe PID 1000 wrote to memory of 3112 1000 cmd.exe timeout.exe PID 4108 wrote to memory of 2792 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2792 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 648 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2528 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2528 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe PID 4108 wrote to memory of 2512 4108 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\net-filim-patched-noencrypt.exe"C:\Users\Admin\AppData\Local\Temp\net-filim-patched-noencrypt.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\net-filim-patched-noencrypt.exe" /s /f /q2⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:3112
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4316,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:81⤵PID:3288
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff83f75ab58,0x7ff83f75ab68,0x7ff83f75ab782⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:22⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4416 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:82⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:3460
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7959dae48,0x7ff7959dae58,0x7ff7959dae683⤵PID:2700
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4032 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4792 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3352 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4364 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1832 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=872 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4228 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3980 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2720 --field-trial-handle=1948,i,10217428473960008465,15506952988725634899,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1400,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=1328 /prefetch:81⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD50a776071f5c84b975014a5a21591f8ad
SHA14ef141371779346e14708c277eaa8e9ccebab41f
SHA256d6a443b6c022d75de256f550324a55912c22a528a2749999648e29612805a388
SHA5128d85b137fd8d6ac8d6eea0ac393cbcae3f0209fcad909f3ee1cd064dc9e2cbf3861f07e6327fe9c94ca65e25499d163dc629fee5bb198467ce5cc6b7fb010359
-
Filesize
7KB
MD5d3caf6e1b8d54c9625f31e6bef93e035
SHA1a68a8b410c1976df08fab687e220d280adc2928f
SHA2560c30766a8abaeaa505d758f97e91214f9c20bb9885a01dbb09a92be16d063850
SHA5123d59adc4cace0b7efa46110cd57266b717cd0bd2fbc78883089be95c2f1265e41cd1acc2cf429e56d632b6c1a29bd1f8154061bbfc8b2ba0a522ea88bf63b8d8
-
Filesize
255KB
MD52044d644c40f8f215b20b7775002e977
SHA151dd94f6d7b72e84fd005587f77999b683d6ad85
SHA256a803488d8bb51b031c4ab3eab04197f6f9544377e650ef9183136ff45b38183c
SHA5126689b92f41c576cc3eedeb0ce433244d626ac1ede8e876f7fed0af97af63c291f0f2310c8721c913932ed104224ed524b71cd208a2ac41b95aafb53c12688164
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e