Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
CLIPStudioPaint.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CLIPStudioPaint.exe
Resource
win10v2004-20240611-en
General
-
Target
CLIPStudioPaint.exe
-
Size
32.7MB
-
MD5
7eef51fe32ad9a7d0dc8ef15ffcc8db4
-
SHA1
f03ada8ee0e29fcd3e9f37a0d4866041d06cd365
-
SHA256
c9e771a81d11701e67d8135c8a33797f57e37807668c9790305a617f65caa1ad
-
SHA512
a24848e4a010e31fa256cce4a2eeec7447ed0f2a6c3a4cff13b91e5233f3990f67ce9ba4d44831635fb63b675d7915864b1a26f6ce7aad1d9c87f88bb8c8e575
-
SSDEEP
786432:bHmHIwjW2HkkkSmRtBwateQFllmZi1DRb5:yHIwW2HkNV6ateQ7Rb5
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5480 WINWORD.EXE 5480 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3144 firefox.exe Token: SeDebugPrivilege 3144 firefox.exe Token: SeDebugPrivilege 5228 taskmgr.exe Token: SeSystemProfilePrivilege 5228 taskmgr.exe Token: SeCreateGlobalPrivilege 5228 taskmgr.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 3144 firefox.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe 5228 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3144 firefox.exe 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE 5480 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3848 wrote to memory of 3144 3848 firefox.exe 105 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 3712 3144 firefox.exe 106 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 PID 3144 wrote to memory of 208 3144 firefox.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CLIPStudioPaint.exe"C:\Users\Admin\AppData\Local\Temp\CLIPStudioPaint.exe"1⤵PID:2192
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.0.755124831\1265546443" -parentBuildID 20230214051806 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f45ff50c-2d01-4ef9-962f-3a0b1db895ba} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 1836 220b6111558 gpu3⤵PID:3712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.1.988764349\45249109" -parentBuildID 20230214051806 -prefsHandle 2376 -prefMapHandle 2364 -prefsLen 22112 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4beabe53-9321-4fa1-9882-1bf719252f2b} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 2404 220a9489f58 socket3⤵
- Checks processor information in registry
PID:208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.2.625979235\1611617547" -childID 1 -isForBrowser -prefsHandle 3268 -prefMapHandle 3264 -prefsLen 22150 -prefMapSize 235121 -jsInitHandle 1292 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6104bae7-78cd-46df-b6d0-d22c1828967b} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 3280 220b8f17258 tab3⤵PID:4964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.3.288885842\1783280803" -childID 2 -isForBrowser -prefsHandle 3736 -prefMapHandle 3732 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1292 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {043d80a3-49e0-467f-8d37-fb4003ae2d3a} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 3016 220bb156358 tab3⤵PID:1856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.4.740690986\266498727" -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 5248 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1292 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {965a16f2-a37e-4f6b-8883-3796c119b342} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 5264 220bd65b658 tab3⤵PID:1396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.5.365310657\281834741" -childID 4 -isForBrowser -prefsHandle 5400 -prefMapHandle 5404 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1292 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6f45372-0429-487a-99e7-ef625ffe97bd} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 5392 220bd65bf58 tab3⤵PID:4348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.6.2062957629\415327791" -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5384 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1292 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {834c3868-90c7-4c73-ada9-ada870ff8d00} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 5600 220bd65c258 tab3⤵PID:2164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3144.7.1050727865\268531164" -childID 6 -isForBrowser -prefsHandle 6060 -prefMapHandle 6052 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1292 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {daecba16-7521-418e-8ccb-a8dfd3456161} 3144 "\\.\pipe\gecko-crash-server-pipe.3144" 6068 220bf211058 tab3⤵PID:5576
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultbed705adhd543h4d4cha504h58004bb6aef41⤵PID:5408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffe748d46f8,0x7ffe748d4708,0x7ffe748d47182⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,7060927155508800129,4701999659941223398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,7060927155508800129,4701999659941223398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,7060927155508800129,4701999659941223398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:5216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:5308
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5228
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Recently.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5480
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
5KB
MD5fdce33bd4ef417df688270559883586e
SHA14feb575a60096750564ced1ca23a9743ed848472
SHA256ab41ed40f035d5170a7bbc9dd0ace871b7be91e9075b4bb58db764550da2db95
SHA5120f1a311613db6c664d495337b6a8bc60041a62c04ff5aaba0c95a61266bbf6e3ed00e429342b30aa3d47b943b0630e110bb421bbac5a96119de31ae9e410f95a
-
Filesize
8KB
MD5b0ef381adb185b2e5d85af3516c354ec
SHA18bedb05ca20edbbac0164d5ff4838f4cb9968673
SHA25668ef7b4135b8a25613fdffaffd4d4ab45d3bad80bab96ff4882c3ea093bcd06c
SHA512dc68696e6c8d0e32311428de5a308b719038a759bee46a271bb64b1c0f0eabe10b51c95d827758a31bfc9ffeb355595f7e22fd7041274a6a54c6ef7d1495784e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\kvgg58fx.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5b7d42951fb52dd6bb1daaa41a4765f9b
SHA12e5d5297d1d05d9f6bff2e5cf754aaf78a8e46da
SHA25608ffde2e037a28e28179745b2a665182f838cad7557e59e342c1915d01e3f7a0
SHA512557cc497b7f1fa507ca95873bafa73f850b27f7b2aceabbe09d7533e9f68837c47f545f15b01bbd7b20635802fd015cf0e4e39b0c31119b02227796d68dbd82b
-
Filesize
202B
MD58e56ace3e1a321219fb91f6a902cbf3f
SHA1a891636695dbd8ebe582bada0a821c0b0b2c5ffe
SHA2568f87addb7d39c9cbbc86110d8f6eb08a97fa9402a82054f241b3901ba0afc9e8
SHA51279f346ef5cfd4779430b472c80d1e2fb585cd944e9b83c55f18badd8b1cf697e84a4054bb31fe46fa08b2ad00cef2c0bcab5be4f20ef19d925172bce0c8fb8ba
-
Filesize
7KB
MD5b29e6146f0568746b4a56df334cf1d5e
SHA1276cb4ad9db5b48d0680af77a95e8cfe91a0dc87
SHA2567875a8bc8426a9dda7efe8aff3c3c0d35b57541bd2fa7a81d674c5bad71dcfee
SHA51215df2b445db1d45d1609d46297bf5199b4e2b4a397423e0698db0c256dbd8b5629fb0340bc890b2328213e7e938d724054d6c32bae5c26c64f380c98a36310a0
-
Filesize
6KB
MD5aea40bd8566af92f36a0ad771f102b69
SHA17498dcc6a574fb6fa76ce38aad3de8d5fcf1315a
SHA2566b9bee01ca9c4ef744f7170fd6d5ca6d7c82fc3d885b98bfa599f2e965daca42
SHA51238918d6f71e8ae2308a4c9aebea5f841142bc0ffdacc20b37bad9eeebe538929f44a23efc358c2e9c976a3d6f2c3f49e4f04801b097e5b4b993b0843eb5aafdb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvgg58fx.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD57332a1934e181bf1b9e76ec8dc832b3d
SHA1b12b05662b363237e3086cb7b2f92d5bc8ac6b97
SHA256c8e80c05fb51229c3ad5c9752f5f9665a99fde4449b787edd7be103712ba36b4
SHA51227143f2b7c3666e27c93af4e2dacefd0e3bf094fe4872f6a758928b8e86ca5466becb55c2ff26f0b3561b0bec17c4b0615df8366ffbb2167604295594a422167
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvgg58fx.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d10644d8ac6284bf6eff109ffe5ef776
SHA1a4fdfff4516142dc0a4a1759a4f42e4d9b881855
SHA256d77eff24ac118ff34f7e97bfde1ab2f27a2f8faa2bd740a6138748b59261e152
SHA512f7c9b5a7558f4d35e9fe6b2847ab49e4f307e679fde775ff10cd4449e40d325f1229812fc4acfe2ea3078fc2e4ad9313406a252a1e4048cf365d46d12a055211
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvgg58fx.default-release\sessionstore.jsonlz4
Filesize4KB
MD5c5982240c010f0c6353066f776d87de5
SHA131e815de2bdb67f219c2365dfde7cfa12f3b1c6e
SHA2569986c69eadb6d5338cbe4d087cb3a8c4ef5effd764bf2f1f5b5b7a742668f78c
SHA512546c5eb13c135b6d6d8c73cf09e751fa3f6f35f31e04418484aeca8e40fc76da437c7e0a538743a33d42609b8dd813ff8558876a4705ba163547290dee388771