Overview
overview
5Static
static
3RC7_UI.exe...pet.js
windows11-21h2-x64
5bin/Monaco.html
windows11-21h2-x64
5bin/MonacoEditor.html
windows11-21h2-x64
5bin/vs/bas...ain.js
windows11-21h2-x64
3bin/vs/bas...bat.js
windows11-21h2-x64
3bin/vs/bas...fee.js
windows11-21h2-x64
3bin/vs/bas...cpp.js
windows11-21h2-x64
3bin/vs/bas...arp.js
windows11-21h2-x64
3bin/vs/bas...csp.js
windows11-21h2-x64
3bin/vs/bas...css.js
windows11-21h2-x64
3bin/vs/bas...ile.js
windows11-21h2-x64
3bin/vs/bas...arp.js
windows11-21h2-x64
3bin/vs/bas.../go.js
windows11-21h2-x64
3bin/vs/bas...ars.js
windows11-21h2-x64
3bin/vs/bas...tml.js
windows11-21h2-x64
3bin/vs/bas...ini.js
windows11-21h2-x64
3bin/vs/bas...ava.js
windows11-21h2-x64
3bin/vs/bas...ess.js
windows11-21h2-x64
3bin/vs/bas...lua.js
windows11-21h2-x64
3bin/vs/bas...own.js
windows11-21h2-x64
3bin/vs/bas...dax.js
windows11-21h2-x64
3bin/vs/bas...sql.js
windows11-21h2-x64
3bin/vs/bas...e-c.js
windows11-21h2-x64
3bin/vs/bas...sql.js
windows11-21h2-x64
3bin/vs/bas...php.js
windows11-21h2-x64
3bin/vs/bas...ats.js
windows11-21h2-x64
3bin/vs/bas...ell.js
windows11-21h2-x64
3bin/vs/bas...pug.js
windows11-21h2-x64
3bin/vs/bas...hon.js
windows11-21h2-x64
3bin/vs/bas...r/r.js
windows11-21h2-x64
3bin/vs/bas...zor.js
windows11-21h2-x64
3bin/vs/bas...dis.js
windows11-21h2-x64
3Analysis
-
max time kernel
300s -
max time network
282s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/07/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
RC7_UI.exe.WebView2/EBWebView/Subresource Filter/Unindexed Rules/10.34.0.54/adblock_snippet.js
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
bin/Monaco.html
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
bin/MonacoEditor.html
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
bin/vs/base/worker/workerMain.js
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
bin/vs/basic-languages/bat/bat.js
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
bin/vs/basic-languages/coffee/coffee.js
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
bin/vs/basic-languages/cpp/cpp.js
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
bin/vs/basic-languages/csharp/csharp.js
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
bin/vs/basic-languages/csp/csp.js
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
bin/vs/basic-languages/css/css.js
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
bin/vs/basic-languages/fsharp/fsharp.js
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
bin/vs/basic-languages/go/go.js
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
bin/vs/basic-languages/handlebars/handlebars.js
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
bin/vs/basic-languages/html/html.js
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
bin/vs/basic-languages/ini/ini.js
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
bin/vs/basic-languages/java/java.js
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
bin/vs/basic-languages/less/less.js
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
bin/vs/basic-languages/lua/lua.js
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
bin/vs/basic-languages/markdown/markdown.js
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
bin/vs/basic-languages/msdax/msdax.js
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
bin/vs/basic-languages/mysql/mysql.js
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
bin/vs/basic-languages/objective-c/objective-c.js
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
bin/vs/basic-languages/pgsql/pgsql.js
Resource
win11-20240709-en
Behavioral task
behavioral25
Sample
bin/vs/basic-languages/php/php.js
Resource
win11-20240709-en
Behavioral task
behavioral26
Sample
bin/vs/basic-languages/postiats/postiats.js
Resource
win11-20240709-en
Behavioral task
behavioral27
Sample
bin/vs/basic-languages/powershell/powershell.js
Resource
win11-20240709-en
Behavioral task
behavioral28
Sample
bin/vs/basic-languages/pug/pug.js
Resource
win11-20240709-en
Behavioral task
behavioral29
Sample
bin/vs/basic-languages/python/python.js
Resource
win11-20240709-en
Behavioral task
behavioral30
Sample
bin/vs/basic-languages/r/r.js
Resource
win11-20240709-en
Behavioral task
behavioral31
Sample
bin/vs/basic-languages/razor/razor.js
Resource
win11-20240709-en
Behavioral task
behavioral32
Sample
bin/vs/basic-languages/redis/redis.js
Resource
win11-20240709-en
General
-
Target
RC7_UI.exe.WebView2/EBWebView/Subresource Filter/Unindexed Rules/10.34.0.54/adblock_snippet.js
-
Size
2KB
-
MD5
f5c93c471485f4b9ab45260518c30267
-
SHA1
ee6e09fb23b6f3f402e409a2272521fdd7ad89ed
-
SHA256
9aa899e0bf660ee8f894b97c28f05db06cc486915953b7f3b2ff9902fa8da690
-
SHA512
e50a1baf20db9bc867e85ab72f9976430e87d8516ca552f9342a5c91822c9e1404e4f915042d48d841cca3fb16fd969bf0aa01195791ce29de63c45814fcdcda
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133665685007750778" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3144 3012 chrome.exe 85 PID 3012 wrote to memory of 3144 3012 chrome.exe 85 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 4324 3012 chrome.exe 86 PID 3012 wrote to memory of 2012 3012 chrome.exe 87 PID 3012 wrote to memory of 2012 3012 chrome.exe 87 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88 PID 3012 wrote to memory of 4524 3012 chrome.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\RC7_UI.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.54\adblock_snippet.js"1⤵PID:3356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xa0,0x108,0x7ff886cecc40,0x7ff886cecc4c,0x7ff886cecc582⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1676,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1668 /prefetch:22⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2392 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3536,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4448 /prefetch:12⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4616,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4876,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5292,i,7112146879163906190,2189398215486269191,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD59a889c72d2b1f5ac2b9ca9f33ee8932f
SHA193d199198bbc9d4801aa63d47ed258bec1bf4ccd
SHA256a1bbb81d22b528aa35bb5834b8a7c1fb411873fa92a070185c00b4b3c92643ab
SHA51226445945acb7fb7e7b39e0d36748f7191e080913fb91b8c0d2c8dad45a088f80a49949443a8cc88f09c81338f833ca8d8405ef48cd3033599f6a86bf4a5faa43
-
Filesize
1KB
MD5cd2a62208eefccc14fbafb51d252c66b
SHA15acbe01895ae9a5383f58f57d5f736f5e9554e42
SHA25663762f548a2cea753f190eb74ba18f03b8a2bfccb816f8bb09bf3198a799c553
SHA5126a8ddf9c1c0bf1f25ddadfa8bd76e6bbcd97b2b5a92d2a0a541496524865d09fddeb52a8a2d4c998ab0099133dd635e21b1336f6b149496aa4e803c022c119a9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD569b8ee2c7eb93dcc05b15d94fba1c2ef
SHA134b179aa62c70daf0e5e71e576263fee4079211a
SHA256e7d9e9e6b9c4946d20751bc9d8ae67b617527fee8753560ceada0f6fe0b65787
SHA5125b78c91497aacf1f2703440b32cf3afa8307d00ca8d57788eedb8bffa47ebe2908ffc3216528cbe040138e88882c66aa7b7e724376f51a01ea617c38db2b4180
-
Filesize
8KB
MD539a1f0858c245d5df33bb1186126bb8a
SHA1c2aca323f18e39631fb0b06baa5a0dd9fcbe945a
SHA2569d67a5b36222adceeb5ddec192c517820a14e0a024f168cd7de389f62b99c072
SHA512f1b7c73681e26514883500589130b0e4714b111c92d8c6303d328ed50fbd6f115fea71b9c89cb4015a7bedd2ff69c5dc81eb6b9f01cec1fdf2dc9d34ae906821
-
Filesize
9KB
MD5d08d4056770e5114c7bbedff792dcaa3
SHA18f49fe36545f8f0a02244c41cf79fb3c7bffa981
SHA2560939662366f18270afb611706a99f8e4642737e793e41f09209be8a966e76e5f
SHA512dcde6290cc99477803296acf09ea899a5db48d9e96cdb8c40ef34b2cc9f8a54114cdf3c00662670b629f92f77ed8c7de024432cddd9f308c4a6e1a485f1721df
-
Filesize
8KB
MD5a213499a133232853026384adbea577b
SHA1d374b17ddcc3b86fb27292554812f43d7d993670
SHA25626f8bf6859e66485711c403dcd1f54c39cd2afc0fa73d4cb421ed85f5f1fb774
SHA512b3cbebde6b2d0fa2a67c33ceff787cc2a5f3691a66ab6c121b97db33c656066094653d1f244c69d813c6522594993dce3eff54e60632db50ff408ddf64e87596
-
Filesize
9KB
MD59ea9cc36694a4515eb9feec5a2a1c5b3
SHA1b62bc0ecec42347e92fe10baee2367066d014e31
SHA2561649e6ca28f1713d45e2a15e592ae7adeead82b5a293f9f7f885dd590bff070b
SHA5120bda08dc74d2e0ddb5836d1808a94093c3485bf1372573ddc65c0c4ead143d555dc08573717745cdf05d76bd3b42695cc386f05d3aac180a9f9847acef3aa632
-
Filesize
9KB
MD544b5d603d85e97606517423f5a8369b0
SHA127dc91e1dabffd7b576377d2554069221e5934d6
SHA256c71c2a0fef7676a0e13f53c41ac60213e4268f81ea45b4e1ecc41456c03e948b
SHA5121fd7683f33cd08ca151977b48dac8027379fc7c189c9e104f92c272db7d647bf3075007fad9b415245c042f5cbd77e4c0e1308bdd0be64645635e00564587f77
-
Filesize
9KB
MD5cbcf2ed2b669827201f62d770066bef6
SHA18ff871209e742acff0852a48a771eb99d3d1a0ad
SHA2564c2215c883132f1e0d541372caa4d3ca869f12ed7122ecdf1fa4857755bfaa34
SHA51225d70337415203a907d98718526c47b74ee4f0cb5a106117692dc767da0ec64f83d0a70816befb2b4a65e2f87282e7f0068e42b94c190c2fbecd787e74f811fb
-
Filesize
9KB
MD53884e7aafac6a7d4b5cd00db9ca3266a
SHA1a2f7e182aa9f80cab27cfdba2a8088ddd57d5944
SHA2569bef106a33520052cd88f585a3d7a14fa4f6d03c1041520ee729440d9813b213
SHA51211dd8406e07dbaa5ea7cbad4021e6a192dc29b6a5828aca942024d77b34e6449c618c9f8a74d920781b8333b1af7d126ebfca9b7e807a1e493d6cbcf2298d8f1
-
Filesize
9KB
MD5df87c412fc5e5156a1b2349d507b0519
SHA1aa63bd0dcead811f477232d5ccddb88f3ed86eb6
SHA2568861608385a7a34418586d0b1d5097b616a005d37aceb95ed860aabde20fa5a9
SHA512d8cb520d5ea10f18686c7062c5ce8b2afe8364e03d79ff524f21000ae0f91258ad24085602bde5727ff1fd2cfff31e729eab89e6c32ca237df8d782d6e0cd6b1
-
Filesize
9KB
MD5bf325375a0630bb20cecf301b20b850b
SHA1bbadbc762f4fa9e4ec939ef6bade7e47a6a7fbb0
SHA256738411105cbbda3e5551f4eb287135947472bdeafa9b79c912be20f2eae481fc
SHA51270a3ccbf2d019752c81526384c7ce5bee1af767f02ad4028289dae522e242a454368899fae1e1d1a2a259ff64c27590a790e51680dbfbba22efe28f0cbd91ff6
-
Filesize
9KB
MD5ded6238b78ba6a6d461fb760032bfa9e
SHA1702c4b5aab7b342e89e17c9209ce5129e9c1c9e5
SHA2562b5c5acd46256fdb8e88132c70a77de5ac4a1a9199ca3ead8b828b09b28018ec
SHA51201da72ace062d1d74d96d2f115d91a464a50d9aa820af2c734d900da29826ec38d743103207f8e69a433737c42ba03997dbd20d0211d7c6c1cfafe2b784eaf28
-
Filesize
9KB
MD59cf0f9531e62ad41b652328237e04781
SHA117654e99858be5f00cc4b858a9c1751dfb11dbce
SHA2566c2aede438dffc6194ccf7fc74a33003246c613320a517248b7ab83b9c08369c
SHA512266341272e3cd33784ddeea6c22909c7f1a9f539c03c3f8da142687fe4e7b7ec84197f7fcbbf65258d6ea82fb40dc906ea7aa75fa3f25a883fdc963b7b42be45
-
Filesize
9KB
MD5a9148ce4a62e9c8e8814257613246048
SHA1765bc6a8e7465e76500c5745b95dbca3b0cb790a
SHA2566c31b3cb3cd9aaf718947d0ffcaaba30be8ee99e9b7a647af58b5594b3abdf70
SHA512338da46e1f4db1ebaf863f8b81acdd29334dbe7485dd007f367228b05efad43b1e46d88f448d067f29153b4a52523f987eb3b79c21201db7900736bebdd00a63
-
Filesize
15KB
MD52b5b6dec9edeaf7afa81f8d1b95114bc
SHA1740ed160bc3c185819eb815c0464c46dddd1172b
SHA256b737f6d7abdc982df99594615c2a967fb2c224c6e63d018a2db9d6371703b3d6
SHA512e44927027403bf8e90e64d839687dcd9f619147d380076087ef7bdadccd6d1f83bfff4ddb3414fb115021ef6685b6561e9009157ad3d8db61db1d77c793a385f
-
Filesize
189KB
MD5f0769ce17a200985761399e683f4fc81
SHA1ac64944f3541e8361fc1777d497055b870861629
SHA2567b65a48bca035975401b05f43bb283c376fc5f380c5fc46209e43092c87228d2
SHA51264dd80b7e694d93aa2c87c582dfdfcfdd5c515b1c18ecec22e45b4b7e2f82e718208f4aa03086af02d7fc7976621aa57e6faa361e3c8d3d51f1a2e993e00fcd2
-
Filesize
189KB
MD5099d826bd5c58147acef6e75025db520
SHA119a8d1983d49e5adfe10ea74ef1a76d9384c41a7
SHA2567c0ac97bad1a5bd6795e2a6a9ccdbb9e6f0ffd2763a1a749d9e75fba6d0d3369
SHA512805ef8bf48281914222b793c2abd89b3ea9c10329373d18c57cf8051fcf5e31c508a592ea2e091d67d72a57511ad1fc7c6c6b91e4f00ee9f9b491e9a9ca1899b