Resubmissions
10-07-2024 23:52
240710-3wsmzazblb 1010-07-2024 21:11
240710-z1mqqssera 810-07-2024 21:08
240710-zyxsxszeql 810-07-2024 21:02
240710-zvtxvszdjl 8Analysis
-
max time kernel
210s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 21:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://57.180.253.244
Resource
win10v2004-20240709-en
General
-
Target
http://57.180.253.244
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sexaps.lnk msbuild.exe -
Executes dropped EXE 5 IoCs
pid Process 3508 msbuild.exe 672 collect.exe 4932 bypass.exe 1500 Session.exe 4972 Pillager.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pillager.exe Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pillager.exe Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pillager.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Internet Explorer\Main IEInstal.exe Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\OperationalData = "525" IEInstal.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133651189964738676" chrome.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe 672 collect.exe 672 collect.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 4972 Pillager.exe 4972 Pillager.exe 4972 Pillager.exe 4972 Pillager.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeCreatePagefilePrivilege 2780 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 3136 2780 chrome.exe 83 PID 2780 wrote to memory of 3136 2780 chrome.exe 83 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 3572 2780 chrome.exe 84 PID 2780 wrote to memory of 2296 2780 chrome.exe 85 PID 2780 wrote to memory of 2296 2780 chrome.exe 85 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 PID 2780 wrote to memory of 2524 2780 chrome.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pillager.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pillager.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://57.180.253.2441⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8ddacc40,0x7ffa8ddacc4c,0x7ffa8ddacc582⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5080,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5112,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5276,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5104,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5412,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5084,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3876,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5252,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3808,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5348,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5464,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5424,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3872 /prefetch:82⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5280,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4932,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3872 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4916,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6200,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4564,i,3003193477203803462,5313163431215572965,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4472
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2104
-
C:\Users\Admin\Downloads\msbuild.exe"C:\Users\Admin\Downloads\msbuild.exe"1⤵
- Drops startup file
- Executes dropped EXE
PID:3508
-
C:\Users\Admin\Downloads\collect.exe"C:\Users\Admin\Downloads\collect.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:672
-
C:\Users\Admin\Downloads\bypass.exe"C:\Users\Admin\Downloads\bypass.exe"1⤵
- Executes dropped EXE
PID:4932
-
C:\Program Files\Internet Explorer\IEInstal.exe"C:\Program Files\Internet Explorer\IEInstal.exe" -Embedding1⤵
- Modifies Internet Explorer settings
PID:3260
-
C:\Users\Admin\Downloads\Session.exe"C:\Users\Admin\Downloads\Session.exe"1⤵
- Executes dropped EXE
PID:1500
-
C:\Users\Admin\Downloads\Pillager.exe"C:\Users\Admin\Downloads\Pillager.exe"1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5bc185611c97935de704feec4898a12cb
SHA10369210e6e4ba3f9a58a84b2077c06272a58ae4a
SHA256bc72f283a8dd2666ea3f4b9ddc49f70f1c02ae732ddd4aa41f20a11af32ba82d
SHA512fb4a8ef10410c0f45254c3d73fab3ea3c5f9a73c02054fea2ac50fe2528223893e0f633c25c6df3499a23a186282af9d55b901dcfe07b24d6616bbc20e3c478d
-
Filesize
160KB
MD5d6fc92aaf99da55514db0d2caedd2754
SHA1ec41e018c89fffb50efa9252becdea0c0343b97a
SHA256a3816afe29bfa5f9b7eb89ea812eb12444480614d47ef7dc15ce40f0afc853cc
SHA5128dba52a685e6d481c4e889a877120deab2c75cb7c38ea41f4edc76d675cfa95cb32beb0cd1cd765a34399bfd6de86eaed1adffb836c415f48474f1ff0c33dbd3
-
Filesize
329B
MD5ff1489fef28a39fda453cc762ec9f480
SHA10be2c1f14c9cce18529a44b7c1637b3af94999ad
SHA2560b318e956bf4877a2abfe04aefb8d22cb8fa027cf911b901c370e72ef81866ff
SHA5123b98c36d2636c4684459537c53cced9d2516af908c0f7afc9f2f8a9228b1c1d8dcd3605bc6fc2f12a383633587555ee63be3d3430c9bc2098984b888dc3a875d
-
Filesize
1KB
MD5d5944b6072b01366d82fdbd64a8febf9
SHA13d9a2e474acb0bee9168ba6d67eb6744c43f0aac
SHA256454e371848b8c8fe4a912a2e652e97e4b3a29ca3305e45873c8a76d3d9445626
SHA5121681f987297943c98b5ac102848e94dc9792ab1ee4e532b08913a3a06721d3cf6f08b420ce6de08afeb2897e55738a978ddc9ece3317df093eabe7df01bdd776
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD597fe44a9282c2731a626c171fd7eae53
SHA19bd900c769419f83dca3a326a1e611a393ba626c
SHA2565feba8fa2fe7dd9d53183146ff6a2902e59b660b35d6dbfaa1a3f65331ad903b
SHA512af6499d5cb7f709258312bc79c2fbb38c607cbd2d32e072651016ac750ae043facb07a9a6e6a49b867a0d943960bee06e000318f8bf70f9846df50a38ebc39a8
-
Filesize
8KB
MD5ac3c4fce4a8f4ce6de44830466e8ef78
SHA10369f20b9f4aa8e50bf57b0784b397eb3849af3f
SHA2568ad77d8fb4a61a8a15777b3e90de9be62acb4c2c2b1216a5e04fec3cc0e3b9af
SHA51266113b4bb9b82abb99ed412c53f1a6ccffcf14774f7a1e39ff9c1815483dc659cf6955fcdfbf313ab77916a9b56e51101bbd58d5b3083b0a1a03fea1caceac34
-
Filesize
9KB
MD537f6b24df333d22fbcc6b163d68261d8
SHA124586fd447ac55b0b6cf96ae2df0c6aea77d8084
SHA2560e4578b8363d9e6fa203315a5ebeeda82bdbd469a5f4b07ccbb16dd44862798d
SHA512b1768e06dc579965c6c42a851d7a27a0bf97b08d116f0788837312d3cf23b1193a1f8c395d69864bfdcbe935e20fada2391b58a1259336e41f1ecb7e6c8759dc
-
Filesize
9KB
MD5cf5c002fd85836393eab52410c0f75c4
SHA1b12335f6304f1f102af877a1b3124b8b2295f54b
SHA256c44c616fc8ae84062d20faa14006bff4762f4fca327cefb4017a150e1d855fb8
SHA5126bbe71f301fe579d0c3018141f7054820f66dec48836ea9f8469780db399669f97807246eb70b009dbd950f68d0c4c8c37434600e00bec7a07257bea879e2978
-
Filesize
9KB
MD5a686c7fcf77120588376b7b48677ade7
SHA123ac09618eb216b30a1053dc8490a3a779795fac
SHA2562375ac4c127e53a49514e49c632487c3823f68ab91ae285d785d63446ca59c7a
SHA512eeb82ef3604fcea1d367234475d8bc91db2c66f70dcca22add6bd234fcd17aaaefd2dfa6d43b92297912f6585299e5849df143db694029fe029324b32f900dc8
-
Filesize
9KB
MD5d5077356342e8cb4c72bba88e3938b39
SHA138b47604407670b3dcb602234f0583ecc4d2d037
SHA256a9c6f37658ae81aae98b5ba8ca5b70005707eda9fcea90e8f9909ff452e73ecf
SHA512a2d63c6488380cd6fdaacdce64eb2cfc5709c42eea63d02bd958a20e447e1a20285cd87548f8e88f69a0b30565eebabf2ed78697631dfd466027a0f9c711c428
-
Filesize
9KB
MD55d90ab8e620bf43a8cbdb3dfe20a6300
SHA1b22a11cdf40ad920db3d31f7fb1a3f0b7ba63f66
SHA256ba4e1ced373fdd3df2ede1b027f8d69ae0087ac250fcc0d1ef281c6b3a5d18ad
SHA512d7fd9a9e222f1a269b0945763a09dbc363c30e5d4ef10c6598f4312cbe9e640c6c3963a3fc2e7c2a512399d3a56f89b0b9e6fdf006f246a31125cdc4ad135f3d
-
Filesize
9KB
MD59d4ad6b8b7f5c63c9e47bd3ecb5b80dd
SHA15c5890b953f1c11f10b83460c6cba0e4445751e3
SHA25639f74ec4e137fcb68d7c2fcbe6efa03b510c764e8baf5383c4fef79f61947ebd
SHA51263bb594a9aeaf85e4d4e9cf36c514bd44eccd8fdb10dcd733e876d5933530cdf1bcec0098d6e5e6a163c41af7b219f44d9a8b0406ab8694745c4e9671ede6a86
-
Filesize
9KB
MD5eb595c49fd9476802e6943c0923c2bec
SHA1123db89b6df29ae842e8482b35c90662f66d4d63
SHA256dd9ca3dfe1cabbd778ed6afc475f0947e4ce85f96c10d3801968d7aa5b2bc9aa
SHA5125fdb4fb9467d59e32754e7dedd894f17c5447d507a86c4254d346fc68263985961dc11154aceb6c8c18d15ee36a122a2e33ae2be9589d41f7e90b28fc052dc8b
-
Filesize
9KB
MD58917293e45d49c87f9e8e7639ee47aac
SHA1844dcef3a265d00100f1c6f3d8891886529017a6
SHA2569af6a08ac2ebdf3ec5e98369f05ec380312f910074fd88a168ea7d3cb80b3988
SHA512a034eb8b9ee2d8ba488108e55a27b725682558b41aa972741b06d2bce7605f882b93603f8ae0c79aa686401559388e1f0a95c585198bc49c9977dce87ec03045
-
Filesize
9KB
MD54f3bd1ebe80c01795cac0ddd91e593ec
SHA107360d556fdb1b44df37806562409569818a9272
SHA256635ee046befb5993f7dd118ac3640c3a43c9c2ca0c294d8aed9d5b86e25ef2a1
SHA5128502bc90ba069173d0548a254a0c21695f2311878d8586d109f1cc548c8ff47e81e30bad13904036c2d70ba7dd13bc66531e3ca63c5c29403022912cf167a5b1
-
Filesize
9KB
MD5df5cbfed1274f74c7c871c01b15fc2f5
SHA165cf007165e9ae6ac85553da668e2775548827ce
SHA2569e3fd8bb3c31db43791ea3fefa0fbe784196fec95bc792211c7f54cc81ccc480
SHA51210f5c496fa6b95f6269584becd10f19f297886f5cd5bc95d94c1b6caec8564d1ee681dd1fc8bf1325aad472bb87b869810d2f9d0d6b8ed0da3cd50c6b2122ffd
-
Filesize
9KB
MD591fdf6f5dd3a10730c944bbf071285cb
SHA177bb345b5f14fa1590b9275d3c58155145ccec85
SHA256a8e7fe975ec95899025f9cfdaf1afb4a0fdcd32e6253ea9dd5d39385acdd7164
SHA5124403d124f0be26e7add6f7084ddd60c846a40467b7fab47e2026d0ea07b6a4d5eb616cc04c41f1b4e0e90e9b27098ab2099485e69f560ed6b16917fbc52c7b58
-
Filesize
9KB
MD529d5794b6fe13a416b09e207cf8bcf04
SHA195464084bc76d5d95612f9621fcbbad0f94e20b1
SHA2569c0776cbc0097096355724bd91cc84c7890e73acb8288a49bab477742d216671
SHA512ddfd2d155c40340b5a027b7591e57c5fe81b039cbf644d496200246b3aa08c996dba64c7dd115ea664db27f37598e591187b23396ae32c1b9dcfd602e4213b1f
-
Filesize
92KB
MD54a124b2f6f1b6c988c8386d4c9701a9e
SHA16bfc2b14560ef59e1bfe190586ec3256d14646a1
SHA25655483091ba28a364c6a9aeca1e3749a107f515d4f38e4289aeb22e2953058e42
SHA51288a025088e6e600b39c7d94533fe6ac08d3064973ba62e441cdd646e5b22442ad5bc59646a82fa2e9aa890501c0669addc247584921497ffe8ee6bdaa87ca740
-
Filesize
92KB
MD5fa180d2ec4d341ac274175dbcb91c9ce
SHA1c1199d76809ccd8c4e9f997fa0c423b77e8785c3
SHA256f6c5e7bf7025e32e5d205f3eb2e68b31830d431473e6cecb556c79a6c5ea9705
SHA512e064a447752f47b929e8e7131e557d4ad12ddc1246b0c4c7e0e62616d713804ed4e5f3cc8e49898fbe76a308930008dba284c3035bee217d286da7606b294c5c
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
283KB
MD58a2122e8162dbef04694b9c3e0b6cdee
SHA1f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA51299e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5.0MB
MD5e48e2923a0fcf3a50ef1eba84d88e953
SHA1d72510e6055979ad7a4f48e28504ef000573a525
SHA25693be475d7b2ba4c75192c50dbcbf5dbaad5e85905b4ec8b9c0ded923dd506b4b
SHA512c81dea23fbfed33914b2c6358c74d8b3068c669f834a36232f4d73761fa12bfb3935c21669e459b7453331175312eed266eafcd4dbfa6ec8d0f7da158e514a08
-
Filesize
73KB
MD5f21b99b36592ff7415d56841d4fd62d0
SHA1965e4ab55cf6defc90fb705e7fd8a34da89aef8a
SHA2566f90f15c3337288d0fc686f6f2e3988043c126c356d6096e99158e60f91c3403
SHA512572c30c0bbdbe275962b7b745272f54f26fb5dc4a174b59e8115c82e1954f300b8d60f96552df25e05b884eda275320bfa38c7b59eb62cdfd0deb55017d65e99
-
Filesize
273KB
MD52a46814f73c0ee996868df06146b5be4
SHA13f17e2b4d1876a54a5e91b7601f2afcc4479925f
SHA256b38322b2a1b73a0f2f1486ff04d8b7db1f5193e804897c16de83e4be7eddc647
SHA5122589865c2fa81f68786f68e11bd06845e34659caccab45cd1031bc123d1398826a0486fda589720359a2067a7c740686a86e9015101aa1bfaebc5a31253845ef
-
Filesize
3.6MB
MD577b8c18bece02b6cfa33f68c743b3c3c
SHA143e5e948457c22e09951e6b7b5ab9cd64bbec623
SHA256e19de62c82f499f2f3748136c337222c2f67effba91e6252fdc9ece2f20595d9
SHA512f9ba19828957665fb9268ee516800504f98e8e31b6c433841a9a6170ae87adbfa4c4cff9f8ba34edca258cbc5b34d22dad325c278c17c4ef6428f1c22472685a
-
Filesize
138KB
MD53c4abc6edb1572ceebfd635531e8d29e
SHA1057b8c0d8a7f9d26be14040790abcf4a2e116585
SHA256248deb03554c5cfdfbab1c07e5b58466e358ca7e23781a1b5e5bdf434cd16ef3
SHA5129b25b94a2eb4c8d39c3d1c462cf0f7ffc5f581d935feb4eee65abbacd7b2e5ed48a6b4de3ead914d26b3bac5e65232432d8b3defe76f5a529ed536c2fa87046d