Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
30/07/2024, 19:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://185.215.113.101
Resource
win10v2004-20240730-en
General
-
Target
http://185.215.113.101
Malware Config
Extracted
C:\axOkKRj8m.README.txt
https://coinatmradar.com
https://www.moonpay.com/buy
https://tox.chat/download.html
Signatures
-
Renames multiple (625) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Control Panel\International\Geo\Nation 8506.tmp -
Executes dropped EXE 2 IoCs
pid Process 676 s5.exe 5356 8506.tmp -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3881032017-2947584075-2120384563-1000\desktop.ini AddInProcess32.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3881032017-2947584075-2120384563-1000\desktop.ini AddInProcess32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe File created C:\Windows\system32\spool\PRINTERS\PPb9yni0z2p39knudi76144g09d.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPjqyb9k7ubq7tojfrhwrcyqt8c.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPl8tzuc9qo94ig70wjzh4q7r6.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\axOkKRj8m.bmp" AddInProcess32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\axOkKRj8m.bmp" AddInProcess32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5356 8506.tmp -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 676 set thread context of 5060 676 s5.exe 101 PID 676 set thread context of 4860 676 s5.exe 104 PID 5060 set thread context of 940 5060 AddInProcess32.exe 105 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe 8506.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8506.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.axOkKRj8m AddInProcess32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.axOkKRj8m\ = "axOkKRj8m" AddInProcess32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\axOkKRj8m\DefaultIcon AddInProcess32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\axOkKRj8m AddInProcess32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\axOkKRj8m\DefaultIcon\ = "C:\\ProgramData\\axOkKRj8m.ico" AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 676 s5.exe 676 s5.exe 676 s5.exe 676 s5.exe 676 s5.exe 5060 AddInProcess32.exe 5060 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe 4860 AddInProcess32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeDebugPrivilege 676 s5.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE 5452 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2748 3424 chrome.exe 81 PID 3424 wrote to memory of 2748 3424 chrome.exe 81 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 2056 3424 chrome.exe 83 PID 3424 wrote to memory of 1940 3424 chrome.exe 84 PID 3424 wrote to memory of 1940 3424 chrome.exe 84 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85 PID 3424 wrote to memory of 1296 3424 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://185.215.113.1011⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdd36fcc40,0x7ffdd36fcc4c,0x7ffdd36fcc582⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2292 /prefetch:82⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3016,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4548,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4564 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5084,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5092,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5412,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4836
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1316
-
C:\Users\Admin\Downloads\s5.exe"C:\Users\Admin\Downloads\s5.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:940
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4860 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
- Drops file in System32 directory
PID:880
-
-
C:\ProgramData\8506.tmp"C:\ProgramData\8506.tmp"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\8506.tmp >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:5668
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2144
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
PID:5228 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{6294A6F9-1ADE-46B4-B344-725A379834EF}.xps" 1336684027349000002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:5452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5c6e92ad8453098200bb67ddb40036fb7
SHA1b6cbdbec72567c3f165b5915bce304dda5934580
SHA256462beeac13966acb68505150322892e58d53b6e58e00ee515aa9f950611cdd91
SHA512bd3cde81891b5074072e3b6f22976d148e8b139986685506e9087a2321b4fb6993617565233b13b169116954f3bcfc72a41f95b00366a20e46cb822ba7b53a51
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
279B
MD53d7b42dd6afbe49b8a666c1c414f549b
SHA1d46c0c162b48085253396908a6fab6b220cae092
SHA2565afc4c350073e6ba181fbfa08de4c7e10a6fe43f71c00e7fc2252465640fd8aa
SHA5127a6894ee9a37f5e6f796afe6742daf7cc53b468f1a5623d1d3a6d96dd1e6aa95ef00328d8b4f64ff8852dd79201ec5b31e09e01e2eb0f5730ea654fc2b5c917d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5a6d642c58101e278e13c8c5234105ba5
SHA16e3d3d39263602d7aa03eae3368ea520049f7613
SHA256e40cd82c34d43d0b91f88690c611387d01fa618db17c2fb807ce2d8a2f48878c
SHA512d06e24329878a112808002e081f8bb143a48a5c3577701af8266fee4dddb70a5d1430bbc5a3aaebe1bbcd29fd51f80a3a7b1dc6f892f31cfb9c639b2972727e4
-
Filesize
8KB
MD540fc4affba4d1aff2f34b33ffc7112c9
SHA1523357e1f64eefd82ff70bb4309bda5f4f717e4d
SHA2566193d9625c0db5103c2c55a1dab84d3cfee47e224d7c48d9157679d436306ccf
SHA5126b252a21b89c2bb384bd13b4c5e914b1978d476e221fed55aefed8a1436c7ed7a2cb91e5927f0a4bbce0d82b291f4002e023d55baedcc456970e4c54b52cf4af
-
Filesize
8KB
MD5debb49401d66a6b29c3ba0e5c8436621
SHA119a1c403b34c897ef7ce6a595655212593636384
SHA256ee54cf705c26ac7274009b22265ed31c289f9365806795a1f0e453b47886858f
SHA512b3c513a7c6c52338b4bcb43628603b6276dc9e0e314c1d44748fec4d44517ec11f12f9b9b39618b57f361637cf1fa62998a7c9c2f582abcf90b6a70a67141dee
-
Filesize
8KB
MD537920b76e5b05f46f0436e4ec25280a9
SHA155e0c8adba0518ae09a8ca8e155cf479282a8e19
SHA256dcd2b325ee4108ddcb4627a1f4eb14b839dcc9ed895f169f9f03830caf81462b
SHA51229290d61e2ceff67d8de13268bb09103e25ce3219d2a26a6963af8634c1fc13a47f86308baac344bf872b0f9fdbb44b9218b60df58a6aa4e257a27732b7d99c9
-
Filesize
8KB
MD571af4ff515cfdb5aa2e37e7f6a09d368
SHA103b4cb5a416500059d50636630ae1b167db38339
SHA25614604f9fad56d20db793ccee0fcf6b51ebb586c1164c7ffde3cda4fec61b83b8
SHA5125a2f4433608815dec216934b6570fb21e8259155d9f9617599a0f486cffa631518aa75922fa27ee5ecf524e2b4fc1c4cd32ff60e6e58980b69938efdf1e3918a
-
Filesize
8KB
MD5e6d89a7a9a7f59979403e8e228a0c540
SHA15f81b8eff4bc8b2eddb320e7cdba8d8e7d801ee2
SHA2568a6a564dca390d7f758629e73267e60146b99e2722e3f103af7247c25c460faa
SHA5127cfd86a3525c59fdc7822edb88612c0e5935a6795aa84200fe53ba92daeb0544ec07767b1bbb654a5519d99c0065cba48b77643ce95972d9746695c98371b708
-
Filesize
44KB
MD5ef775b420665939ec6f54f7c6c568139
SHA1414e459415128c3a8483a53079f44d59ab4a2e73
SHA2563a21bcb8049652b569c524919277c24fe495bcfaaa2f3f53ba9b5a0ab9d6bb34
SHA5128138e82d3e7f08b43fdfce0351ab80fcc9a3169e51e2e20eca83a6fca1b8045cbecf3039a50a08be0f62fade29a48c5be118414162e5aeb9fe09c84824a5cb8a
-
Filesize
264KB
MD5f2ea9eacbeb9cc2e77aee5a8cfea9ad0
SHA1a4a12f4640fe8a78cf54293987bf15eff760fa34
SHA256f8bd4b0e380383ae715d65b3c0f98218d2d9e254b6b44881a54d7cd116f7f877
SHA512b36df57a2b1d87e19ecbc8d25756edc0aac382b3d6673d077065b55f13fafc2d9f6bffda2bae3d64b9db68e032f725d9d88618d1340f77dd70fd9d2e8c3035f2
-
Filesize
4.0MB
MD540aa4e0dc3e5183de788077de7ecd0b1
SHA12b1ca7245cbf4a1732d5e1d246e401d5a9dba7fa
SHA256cb0aadfb49df8a7367f2471431e4082e3b3b3877e36f23bdab50a40d5d01db61
SHA5124a569facaf371b06f47c08dd8b51d587267553317acc2b02cac3124e49b507acaa19603e26bf2835d0e577ab14f7b70190f6a50f64eefeb3329a8a7e7cf2e0c6
-
Filesize
346B
MD525571cbb43f538b3f25e23e464d0fe2f
SHA1861ac122a749fa8af2a17db5aa09ff34840e9a9c
SHA256079973844cc6e0b72be421e21ddb5fe1cf4d13a83218c2355a73aa4076343b3b
SHA512b771c84b6fbb7302368106974fc2dbde7ed52079002e9849be425503dddae592417e5f584808230249fde7060151e4010f70ed20679e738750b8ace8d77e7a27
-
Filesize
256B
MD59cd89c0cb89b839da6e043212ea482e2
SHA123f2e105c4e1b127781ceab9945e4e0934df041d
SHA256cd695747ddf34fba699e6c445c005041e706c30d15c82b75c528d74cce712185
SHA512f043ea89afc1da573340559a833e0b07ceb5a3f5218179a5120b2df70295c0146b783a258173114f6d04128eebfaf7bef5a4c7860b419bbf08baff780cf72f4b
-
Filesize
101KB
MD5b0a9dea7b9867d2684d803aec5daca43
SHA12f964e10ed7ac4e2842271395a689791c20f1793
SHA256d3163eff134a0d44dcede4f96fb16cb9c18d541773b2ef72ea8ec69601907144
SHA51269b2b7b063ab36d703028cb489d95bc8e38744c9a0f55c747215afba05dc9b4c822bf7a9c8331fcca3a09fc5c54e4ccc8556c473760f27deed05caf507088990
-
Filesize
100KB
MD556c43d9b9b31467e113973cf553f29c7
SHA15a4f51d6f8320a032644b0546089fe3fde61b92f
SHA256e8c7dfee6d5f6f6a32e0601716078070595f7d80ef8438559ac33a7909ecfe97
SHA512eaf2483cee1667f0ef4b5a8c2426a11493c9428eef003d6cce767a37b3da97e227c9719694d48ac577b19f0eb3a4ce1d7750abd3da714ba380967a7234c44325
-
Filesize
100KB
MD5e533eb254fac3cfd9cd92c98fa004964
SHA187f9b3a3d69eb8fc1f9e80671ecd751266b8915a
SHA2561fea2eb253d08f26074cac39b3a6a5fd036c8d305f7618fc2a5d4edf3c8e56ca
SHA5122e909cdd9eb8d6d8d6796b1070db010b8fde71bc45235e59335515a309137a1e90259384696c0ffa954c886fec83d4d3821cf03a51fe67ca5b6c1b4d99fd4e1e
-
Filesize
321B
MD50aab6042234cb8fe9cb11637ec0ff363
SHA102101c6ec5e07adb9fba6d5352c5ac54989b91bf
SHA25685e8d19af04c4383ba19ad20c6cd8b1e502f980d343c60a8c10bc0e13ab5cfe4
SHA5123b047dd89e7bb7e50f3a24bb7ac0c432721b3cd5ecb6efaa4c6dbd1b0a8fe8ff965a10cd12f3529acd8070e521dc24d1c95435b383cbcc0d54cbb81242ab5c49
-
Filesize
48KB
MD55a1706ef2fb06594e5ec3a3f15fb89e2
SHA1983042bba239018b3dced4b56491a90d38ba084a
SHA25687d62d8837ef9e6ab288f75f207ffa761e90a626a115a0b811ae6357bb7a59dd
SHA512c56a8b94d62b12af6bd86f392faa7c3b9f257bd2fad69c5fa2d5e6345640fe4576fac629ed070b65ebce237759d30da0c0a62a8a21a0b5ef6b09581d91d0aa16
-
Filesize
28KB
MD5749247e08029a3094d75bbcfb0f8b33a
SHA1b945c8473f1f950018ba7b88b515fcb2a2861768
SHA2569cc98e8ade3520103a2576e339fcc9c6f19dc94a9c48c2bf2493b9fe8f2dd8c8
SHA512ed234a99a1abccf351ba4a1f8979dc1a9591dd472a0e19e68116f5dcf922753fec8b7b4e1fe1bc0370bb0db571f5035d5374b23d012f232f067951f935683806
-
Filesize
4KB
MD598e1b159144ca2b64e268c41c2cfbd41
SHA142d002c709c79bdc3eafe1adeabc8d013651d0d5
SHA256f85120923c510cd79384fc6a5812258f34baab5dff65d58f0e3f9dc553f2e999
SHA5120ba136fc075c7eb1b50f9bc9da997e1c716f72db49423a2b1ac6aa3219b29c4be06d3e0bc4fb772557b44585dc3903e40db8c1e62647c7318a250cae962653a7
-
Filesize
4KB
MD59ac2717bfaf20b9d8996225c74b1e91c
SHA1cbd43d3c64aa270853861917f23240313aeebd9e
SHA256fa22183a1ed9184437b2de419c05d1519ab0e1b01c9865ef89a32fa628fc66f8
SHA512ebdac103f708c4f959d9668aca5e151a6df6549501551a0aa9fc9a384abd0921f15775426978e54849ed94efd8cbe2d205f2b96e0e80772a7baed48d11fda3db
-
Filesize
1.2MB
MD55c5f622e093ec21e8bffaf8b1aaf775b
SHA19e7ba88b6adff9020aa70061c22576601acd6730
SHA2568d52782438c7f8de34e301a512613cb028c0b80f00c3e4011e618be72fdb7243
SHA5122acbd5878dc0e0e753c7fa5c68abb6afbb9c705371dcdfcbbca4c58f977f88fcbd4533bde33a23d59546aeca908642b8283523ca1cb4e3fa6fa7e04f20616db3
-
Filesize
1015B
MD5585e48da096ab22d9727946d44a47696
SHA12dc1aa3c6a6e8036e3f6e91538592522a91760bb
SHA256631a4ff42b358b232f4bdfb989e139aef88aa75698e6a07f66fc3bd36fd7463c
SHA512dbf2f14be8c40b217130e769008910a17a4894d775296348e68dffcaa82dfaa707c43ecb820dd141dd341c75005d060fa6e1b54f3b71ae411e489b7fdc655dbf
-
Filesize
129B
MD5e80d89716862372902b566783a0dde9e
SHA1b1ed6d5e4675ee9b07c8d62100b7d7db02f96e02
SHA256df7226acd4e25bfdff37219d857ad40379b87fcb1f0c7fb6574d601faa8f14e5
SHA512adc84677ab6b951ae098f4e7617db96072f3d3148588b98fc8467410443ec0f494e4e297b0794c44b8fc4cf5513d9911169808d151234ed9cf15b0a5c3849fff