Analysis
-
max time kernel
258s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 12:05
Behavioral task
behavioral1
Sample
fix.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
fix.exe
Resource
win7-20240611-en
Behavioral task
behavioral3
Sample
fix.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
fix.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
fix.exe
-
Size
35KB
-
MD5
83bbe29b99a54bad48074efb72ce1fcc
-
SHA1
421deeba13130a8eebacc8c7f48f28e6fe8485f2
-
SHA256
99bf031f23b1759702a56ccfc9425f0a063654dcc4a94d8feeb89792c82f3082
-
SHA512
67fe2ac907c297cd3c4d1af7f80257b468bc4e73cab428568ea1238d41cd8c43262765a0b0d43b2accb003901a66e9e7ec162fefda2fd89040697e1e168ac27f
-
SSDEEP
768:ChiLce92aOrsQiUy5FyS9ZL6LOjhibold:ChkceWsQi5FT9ZL6LOjGo7
Malware Config
Extracted
xworm
5.0
20.ip.gl.ply.gg:53765
JCfj6Aifpywc6Ul9
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2096-1-0x0000000000B10000-0x0000000000B20000-memory.dmp family_xworm C:\Users\Admin\AppData\Roaming\svchost.exe family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 4932 powershell.exe 2352 powershell.exe 4252 powershell.exe 8 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fix.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation fix.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fix.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" fix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
Processes:
chrome.exeLogonUI.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643093017904811" chrome.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "217" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exechrome.exepid process 4252 powershell.exe 4252 powershell.exe 8 powershell.exe 8 powershell.exe 4932 powershell.exe 4932 powershell.exe 2352 powershell.exe 2352 powershell.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
fix.exepowershell.exepowershell.exepowershell.exepowershell.exechrome.exedescription pid process Token: SeDebugPrivilege 2096 fix.exe Token: SeDebugPrivilege 4252 powershell.exe Token: SeDebugPrivilege 8 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2096 fix.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe Token: SeShutdownPrivilege 3540 chrome.exe Token: SeCreatePagefilePrivilege 3540 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
NOTEPAD.EXEchrome.exepid process 3084 NOTEPAD.EXE 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe 3540 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4924 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fix.exechrome.exedescription pid process target process PID 2096 wrote to memory of 4252 2096 fix.exe powershell.exe PID 2096 wrote to memory of 4252 2096 fix.exe powershell.exe PID 2096 wrote to memory of 8 2096 fix.exe powershell.exe PID 2096 wrote to memory of 8 2096 fix.exe powershell.exe PID 2096 wrote to memory of 4932 2096 fix.exe powershell.exe PID 2096 wrote to memory of 4932 2096 fix.exe powershell.exe PID 2096 wrote to memory of 2352 2096 fix.exe powershell.exe PID 2096 wrote to memory of 2352 2096 fix.exe powershell.exe PID 3540 wrote to memory of 1548 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1548 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 1116 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4556 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4556 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe PID 3540 wrote to memory of 4560 3540 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fix.exe"C:\Users\Admin\AppData\Local\Temp\fix.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\fix.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'fix.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SYSTEM32\shutdown.exeshutdown.exe /f /s /t 02⤵PID:1748
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:3084
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff8eabab58,0x7fff8eabab68,0x7fff8eabab782⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:22⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4304 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4500 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4852 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5092 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:12⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3132
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b7055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5e70f34bcf137f5a906c965dbc341d42e
SHA134d583faf962bd3454eb324b5336e04f40be549b
SHA25642b23bbd1d3e131e46e3d904700c705bae7bff385fe8671c60e09fad8632220d
SHA5127b20553a8037cc0a21d4bcec31dedd5f2065afbbea369f9e2e8dd3ddf7854f659de68417a77f1b08a0edf0f9de822041467d786bd8ca40521a723807e259b75c
-
Filesize
2KB
MD5938c3c9688734f98ced3186afe767dff
SHA1cd2488b877bc9ab80f31eca4dda3d6e0717b6e74
SHA2562c08b80adc65e107152aa691cc2b70286c6068f9949c6b9ae2a207cf4897e160
SHA5125e9b5cc38ae3c3bafa30418d7c3ced6fe9c269790279f42002fa86d507453ddbf4ea8ef77d8e4ba69de81be229be76fc64033d2ff59d96f8964ca77811b72cc7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD53dc7acbfbbdcd7295d2ee7f64b4d9836
SHA19b0d9f1f90e0938161798cdda4e8e13446c4c5a9
SHA2563d1d4fa35931c3ec1a50b4d931520306132c56be6325f7d8bc632f72d237c2d4
SHA512270e126672c45750eebc58c9990bcaac3d3f4bd352eb8cfee174496e0b189d88e2104f8c8fc7dbb67e500ee438ec809e39c91f4d32b68abfab88015e7e056bbd
-
Filesize
356B
MD52871518232ee141b0379188fb77692db
SHA120dde297cd9b0e4de53da6991cba34097354f8eb
SHA2568e49bf3d44bbf90458a4e79b37e129d05b37d6988b532d75d36e162b76a0ece0
SHA51218d2164c8eeacbb275f5ff4211f2341af00d1e01d23facf9cc41077e097ab6dcb1b9a638734ec5c2d0d4686e06d7c4b91d3dc7b330b6fc9e2b0fec6a66d9698a
-
Filesize
7KB
MD5189228cbf89f1fe19701f10cead39075
SHA1af71583062643be3b931fa1b6a7c9eafbaa66e2c
SHA256bb38099a29f89104cc7f74c2f8bcaf38482e32724969d52cd151cb3b3a3e6791
SHA51203fba2fb520ae8d40fdd62af8d745344cbcc1a2b37c6b3ee10c45fa88474293b6662906434d9f23f8e0a755734cd9764b3ff653603f4401693c493ee25240db1
-
Filesize
7KB
MD577690344155c5971353eba945d6dca1a
SHA1d646daf8afc12ffcce32d20110538aecd8790b6c
SHA25600781321cad54c703379370696df6f93a4af63a4cbfed1d6986aa1bea604d419
SHA512766f13dc34ba63aaa915684654e1d63ff23a93808dbb18cd42b8dcff437ed15bd0050d3486c1d3fbd048c33fe26cd3191b4338abacdd1386a52c72613b0f0fed
-
Filesize
16KB
MD52595f568e4032f5ab9a67a93c9a1f7ee
SHA1b2690d8ebf8d517fa970e010ac595be206210979
SHA256e4fa4b6030f2e3c6e6a0261d055a0c047d42064b2429977d7f325c91887e56ab
SHA512a207418403729afb3a500975fa9253fd3e4bc1a007c0b4a0bc214fd3b5b260c87d20cb498cd27e12ab0054cef1c8ebf2eb256470ece5ae40c85187c84ae3dfca
-
Filesize
269KB
MD52df17a6e82529f07148062f5a2f98e16
SHA1d714707034e783d6f36b3fb7dc8efa5e69475279
SHA25667f4b6fea5a3b18b48d04047aa3d12be9f8f5c4f180ba0637a1dea3a541c43da
SHA512b1fecb7e5b7db6b0a4221a64f36c55ab1ff8fedc6e2bfba00688bcb41c41f229b24a9b5cddb496567fe609b1178f2416cb4b8b85b48d32db07f3e2176fbc9745
-
Filesize
269KB
MD5e1bbe9a6a1e5c31ae9607c6c654bb6a3
SHA131200e8776a0bad9b87d7a35eeddccc47d9be19e
SHA25624a5b0ad6d37d69f58da6005bc4d72a65230101df467f6dfa4c8675d71e1ca67
SHA5124081226db161da1c4881dae563ffe5deaf3e6f9eaca27f8f636e2140c73c0db6d6a470e00edd295555389f9ce2b23a4941f906792a808c2e143054e32bd5321b
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD50aa63dbb46d451e47a7a682c64af776d
SHA13b0026f2dae8e9c491ccaa40133755779de35aaa
SHA2569158038718d41172c22a3c1a15852405e3e1c8e2c44fa066328eb1520e5d977b
SHA5124d2564850c2ab1bc71089412f19147df4a1cd3075aa2039aa894271b333cd9c510b7ba4d70889f24d45d8b366d8b5167abdcf24314e4753420337c7d34e7c43f
-
Filesize
944B
MD560945d1a2e48da37d4ce8d9c56b6845a
SHA183e80a6acbeb44b68b0da00b139471f428a9d6c1
SHA256314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3
SHA5125d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
35KB
MD583bbe29b99a54bad48074efb72ce1fcc
SHA1421deeba13130a8eebacc8c7f48f28e6fe8485f2
SHA25699bf031f23b1759702a56ccfc9425f0a063654dcc4a94d8feeb89792c82f3082
SHA51267fe2ac907c297cd3c4d1af7f80257b468bc4e73cab428568ea1238d41cd8c43262765a0b0d43b2accb003901a66e9e7ec162fefda2fd89040697e1e168ac27f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e