Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
211s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 04:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/WolframAV.zip
Resource
win7-20240708-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/WolframAV.zip
Malware Config
Signatures
-
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe csrss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe csrss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe Wolfram Antivirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe Wolfram Antivirus.exe -
Executes dropped EXE 13 IoCs
pid Process 2664 [email protected] 2860 [email protected] 940 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 2052 csrss.exe 840 csrss.exe 2440 csrss.exe 2408 csrss.exe 1108 csrss.exe 1536 csrss.exe 1156 csrss.exe 804 csrss.exe 2672 csrss.exe -
Loads dropped DLL 12 IoCs
pid Process 2664 [email protected] 2664 [email protected] 2860 [email protected] 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 840 csrss.exe 840 csrss.exe 2408 csrss.exe 1536 csrss.exe 804 csrss.exe -
resource yara_rule behavioral1/memory/2664-283-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/2664-294-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/2860-298-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/940-331-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-356-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-383-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-406-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-414-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-421-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-429-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-439-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-460-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-468-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-490-0x0000000000400000-0x0000000000CE9000-memory.dmp upx behavioral1/memory/1688-498-0x0000000000400000-0x0000000000CE9000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 9 raw.githubusercontent.com 10 raw.githubusercontent.com 13 raw.githubusercontent.com 14 raw.githubusercontent.com 15 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main Wolfram Antivirus.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1688 Wolfram Antivirus.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2664 [email protected] 2860 [email protected] 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 940 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe 1688 Wolfram Antivirus.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2448 2236 chrome.exe 30 PID 2236 wrote to memory of 2448 2236 chrome.exe 30 PID 2236 wrote to memory of 2448 2236 chrome.exe 30 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2728 2236 chrome.exe 32 PID 2236 wrote to memory of 2812 2236 chrome.exe 33 PID 2236 wrote to memory of 2812 2236 chrome.exe 33 PID 2236 wrote to memory of 2812 2236 chrome.exe 33 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 PID 2236 wrote to memory of 2556 2236 chrome.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/WolframAV.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7549758,0x7fef7549768,0x7fef75497782⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:22⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1712 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:22⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3456 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2640 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1144
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc01⤵PID:784
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\WolframAV\" -spe -an -ai#7zMap31909:80:7zEvent57271⤵PID:696
-
C:\Users\Admin\Downloads\WolframAV\[email protected]"C:\Users\Admin\Downloads\WolframAV\[email protected]"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe"C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Users\Admin\Downloads\WolframAV\[email protected]"C:\Users\Admin\Downloads\WolframAV\[email protected]"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe"C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exea execC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:840 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe"5⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exea execC:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"7⤵
- Executes dropped EXE
PID:1108
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exea execC:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"7⤵
- Drops startup file
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exea execC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:804 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe"9⤵
- Executes dropped EXE
PID:2672
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47d92b74fd08fa66b3bc55d3c6927ea
SHA113074b6a4b70be753303543d331de77cd580f61b
SHA25671f27a1e03fd210446efd4c845d354de7c55c308c0531def81e9241b3b2d83a4
SHA512a4fc5ac1c30443b1ea4d2391f4407271449291cd5b16bf8367143c6d50f67343f808f034be64484eb8b61a813497d1fab2925130f542e4a02ac12579266497ba
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD52f464728788f025f1779836089af476f
SHA1f9aefd63c785893dff4aaf4d5440e3302d2adbf5
SHA25636776fb0144b8ac0a7c35e4a2aa1a1ce668b9b1211935117626bc31380d56a72
SHA512b5b44ed728726b037616411f2d4ebc15b63424f12088216d1e2b6d3ca502e52b9581ca016c91c5a858968d1c2993153755b87eef24ca488af1d17fc66263ca6c
-
Filesize
6KB
MD5a4886f18cfa413e49ddbdaf9225d7aca
SHA1a3187afaffe2f2a1669632e5bb9dac40053b9a42
SHA2564cd37c7f02c823cbe6c0802d72fef6dfec18de14a59b7f4fad5b6e8ce8c63f3a
SHA51239ea60fb94b2db33b45618f85080ff2dd1dac7ff8df1c5edf9c75fd7f4700d6fc7e3870a7e056606a12e4aa6297ec10885fd6d286854261d765a5a490437289e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
154KB
MD575e0a85c5b6ae58b37ef99fa94c36f05
SHA1f904e18721f38693e9ec8839f3aeb356c5574133
SHA256a03e9d2fd6b69e7d134e331d84b1c01cbe12c3c197a3f14dc340a81604e5d26c
SHA512d44d3e81c3fc129e4bd295f84cf01ef0356bdde3d2c19dfdff11b8d272d208371bd4d1cc5931d4e7fa2b502f759670b72349b3de639e20b98aa0414156f79975
-
Filesize
154KB
MD5a4897c418fe9fa4a4e88bb3d0901db17
SHA1131acf0d314fe02c86c67a31e578e6e857a352c3
SHA256bc48d466f4400060b509dd00eb8482055775312f7e39745f0606465691614fa0
SHA512e7ed501ce6498ff9b5b49bc6eb031e6639b6a838cd5229bbfffe31ea029e66d6286b28992fa40dd001bd95a9c58222fd6ce294ec8238beb0fa0e74807c4422ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
300B
MD5fd49a0bbed6577af66913c9802785e82
SHA17b2a94844803b0cef44669d163f3c19e7672b6db
SHA256ecc501bf98587d0b822e13cd983776e66a97c2979508e3e7226a71b29984e67e
SHA512b4e6b6a2d7d6813019286fee8e931755fb80b9d67a7bcbea554f65bb28d2d496d8ee42464ca7a98fa73d319e94378fc02d138ad12a8fbb7d331d8a844bccf609
-
Filesize
901B
MD52dfe6cbc2978ef90bfe029d982cd293f
SHA142f022d4806a9aaa1b3cc79375b409eaa8c6813c
SHA256e55b032639e404cc68b68d902a69bd2862e8cb33349716819e067740d5f25fa4
SHA512d954ccb2a0ed82837af385f992cf26e6bd51b8e9e167b0b02e2cc5aaf14b942c250bf098944201e574b80a6685fe36341146a4d8fefeee1f4b28423c6970c2f8
-
Filesize
2.4MB
MD55a58f30a316ba75a1ebed54621dd2635
SHA119b5abfad96aaa7541ead444da14bf3a67ee2a14
SHA2561b07719b899418d446ec78c9a7d6970d3b61e4a0987838112fdc2460b6c134fb
SHA512f88910fb6387962b189345f310b2ebc9e3898058301b0ae2cee8769138d7b50d1729e63e9f05e1eece30afe1ba7a91a1ef8d7831370e9e8378da17fbc5b5d32c
-
C:\Users\Admin\Downloads\WolframAV\[email protected]
Filesize2.6MB
MD5ba371189ab70090c298d92d502e130e5
SHA128b6c0172da07a81ab58f5e71654b047914f3f89
SHA256b9afb9c819302396858d2966371d904d9dd8661da835fd0ccc74758aae84e519
SHA512a8d8b26afe4b1846b96d264a4d97d364a77adc698a4c14b26014742f59e611defb54f90a4c185004ac05d02e3e51de3b35e48853b6ef5c205b55d112f5260ace
-
Filesize
222KB
MD508bd665ba70ed5c9df9ca94b52f283ac
SHA1dc7fd2f628a388943677328fa62c430df12bfd4a
SHA256e405a76f5599eff5049a7360684ea87e69e67794b95370d17a35e31cefdaec84
SHA5121394475d6a92e090dae49a966ce48f20f928ea953b1c3f22e3613bd11dfd3e43181cb5f429b5b370d8b45909857e030108d522b470915a03f3cbdbf4cbbbb53c