Analysis
-
max time kernel
113s -
max time network
117s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 11:25
Static task
static1
General
-
Target
file.html
-
Size
312KB
-
MD5
eac54c77a132de1321de2b7c014512a9
-
SHA1
58e2f16d2ddb9dbd5908f291de2665fa8bc1e7f6
-
SHA256
a83fea4d354875936b6239b40ada368af6f69596d78f94e30dbd786921bac719
-
SHA512
e89e8f2588c377762430f563234112be0ea00495ec0878e90f11bf699e2738fa52b8a040289611e60afb2f2624f025b4f92fe6ae4712011c892d2ae802b22e20
-
SSDEEP
3072:qi7gAkHnjPIQ6KSEc/rHzPaW+LN7DxRLlzglKSVO7k:FgAkHnjPIQBSECTPCN7jBSVO7k
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SectopRAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1248-196-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/1248-197-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/2536-205-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/2536-206-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/1248-404-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/2536-579-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/4556-666-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat behavioral1/memory/4556-667-0x0000000000400000-0x0000000000D28000-memory.dmp family_sectoprat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
GrabberBuilder.exeGrabberBuilder.exeGrabberBuilder.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GrabberBuilder.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GrabberBuilder.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GrabberBuilder.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GrabberBuilder.exeGrabberBuilder.exeGrabberBuilder.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GrabberBuilder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GrabberBuilder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GrabberBuilder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GrabberBuilder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GrabberBuilder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GrabberBuilder.exe -
Processes:
resource yara_rule behavioral1/memory/1248-196-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/1248-197-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/2536-205-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/2536-206-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/1248-404-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/2536-579-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/4556-666-0x0000000000400000-0x0000000000D28000-memory.dmp themida behavioral1/memory/4556-667-0x0000000000400000-0x0000000000D28000-memory.dmp themida -
Processes:
resource yara_rule behavioral1/memory/2184-580-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/2184-602-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/5048-633-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/2736-654-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2184-602-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe behavioral1/memory/5048-633-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe behavioral1/memory/2736-654-0x0000000000400000-0x00000000004CD000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
GrabberBuilder.exeGrabberBuilder.exeGrabberBuilder.exepid process 1248 GrabberBuilder.exe 2536 GrabberBuilder.exe 4556 GrabberBuilder.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
GrabberBuilder.exeGrabberBuilder.exedControl.exedControl.exedControl.exeGrabberBuilder.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GrabberBuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GrabberBuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dControl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dControl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dControl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GrabberBuilder.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133669851299059037" chrome.exe -
Modifies registry class 4 IoCs
Processes:
chrome.exeOpenWith.exeWScript.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\Local Settings WScript.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\TokenGrabber.zip:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3968 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
chrome.exeGrabberBuilder.exeGrabberBuilder.exedControl.exedControl.exedControl.exeGrabberBuilder.exepid process 4684 chrome.exe 4684 chrome.exe 1248 GrabberBuilder.exe 1248 GrabberBuilder.exe 2536 GrabberBuilder.exe 2536 GrabberBuilder.exe 1248 GrabberBuilder.exe 1248 GrabberBuilder.exe 1248 GrabberBuilder.exe 2536 GrabberBuilder.exe 2536 GrabberBuilder.exe 2536 GrabberBuilder.exe 2184 dControl.exe 2184 dControl.exe 2184 dControl.exe 2184 dControl.exe 2184 dControl.exe 2184 dControl.exe 5048 dControl.exe 5048 dControl.exe 5048 dControl.exe 5048 dControl.exe 5048 dControl.exe 5048 dControl.exe 2736 dControl.exe 2736 dControl.exe 4556 GrabberBuilder.exe 4556 GrabberBuilder.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
dControl.exeOpenWith.exeOpenWith.exepid process 2736 dControl.exe 3116 OpenWith.exe 3092 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
Processes:
chrome.exedControl.exepid process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
chrome.exedControl.exepid process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe 2736 dControl.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
dControl.exedControl.exeOpenWith.exeOpenWith.exeOpenWith.exepid process 2184 dControl.exe 5048 dControl.exe 3116 OpenWith.exe 3092 OpenWith.exe 2632 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4684 wrote to memory of 404 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 404 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 3640 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 2140 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 2140 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe PID 4684 wrote to memory of 1784 4684 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9174cc40,0x7ffd9174cc4c,0x7ffd9174cc582⤵PID:404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1800 /prefetch:22⤵PID:3640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:2140
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:1784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4676,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4732,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4764,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5008 /prefetch:82⤵
- NTFS ADS
PID:4620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3296,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:2788
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1120
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3096
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\TokenGrabber\DControl\ReadMe.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3968
-
C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe"C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exeC:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5048 -
C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe"C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe" /TI3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3116
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\TokenGrabber\DControl\Defender_Settings.vbs"1⤵
- Modifies registry class
PID:4104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3092
-
C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2632
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5a8ec4f0fabb875bcbb1c73a1910b9d98
SHA14617f95e1f027d7ea080a4229441ce2974767c78
SHA2562e673599c07e8d86144f8752857bef0bdffd7e1f66a944153edf5d9ffac5192b
SHA51247612d59a020211c0b4e14d74f9b18aba1215140c8d41f74a62eaacafca46d0e95a0d0794396439af409334bcc68c1ac068ee9c2c7809d27882c944f71c799f2
-
Filesize
576B
MD51dfb9535e9ee4a0cd9ef6bc9edd5937a
SHA1fb45c5eed5c572375db4dd388c1c21dc08fbe557
SHA25678eda5b86cf219cd502b8d5199c52f8c159ea7ec921bb8b9b991e27637152f11
SHA5127412130b01b8049d0345e1c8d06cf5029e7e4da896a8d756e53c8286f438d1d440a476cc9be14f387d4f70d5eaa8fd31eee66a6a98466493759961a6211405da
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\77a4d569-aed2-4972-943a-80de32c62c96.tmp
Filesize1KB
MD5acc996492315d953390a7d870a74e8f0
SHA15106fb08d0fb39de30bf8b91c2231ecf4ef3d8a9
SHA25613f1f760c08acb20ffb0ffa444697055a24005c951553d44e4a23b0dffedcb50
SHA512d3ca2aaf88a8e8160dcda331fdaa39a43fcf271891869fe749264966ec3d4e781171263cc3d1770d3f3e9c06afe0516d6d7f65fc71b75d8b10d20d8636db0e22
-
Filesize
7KB
MD5e8ed33a20153558aca8746038550ff0d
SHA1f5c67356f63b685ed6069b9c6685d68b19adb765
SHA2567d856a509e58e55b45c5e5a57aaf4432a784cf3203286c4bb0f2076bb79a2690
SHA5129cfe5ae7df12fee1dab80824457382bc416eb8cd886d906bfe6073b128b8263c5dc4aa1f132c83ca005ae153f00943e532b819d257dc70a7807902fad92eca9f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD55b8cd4407634d360b45229fbba99ffad
SHA18825ce51dbbf5fbf87e42b262cde3f865c908345
SHA25618cc2ce41ef8c6d9bf1b8f93b771bdc548add6be68ef142e00321381460a05ed
SHA5124aea01fe5db67789486b630a8221f38a9fe220620145365224f31f0ee6e8a130957c76f1f9a97fd492ef038c55a9534941daf302c38e08cdf44c63d6156c7907
-
Filesize
9KB
MD574ab218df984ffda543985606f66acf4
SHA17a640e08a167f5680df43de574fb05edef78ed33
SHA25649b86ba383c26bb1e4535af80aadf282f46799eaf7896882487c037baa798480
SHA512cf259b6f605d3fe144701e34932dc7ed3f8138b1a484027047bd271034d0e9f84da0814a3b5c2f28e68d1c0e487d114986410e5618f76ecd960f4a49fa1b0ec4
-
Filesize
9KB
MD598102ad1f4938ceb8d24ccbc7c713005
SHA1a80e9bc61e250bab12977871ac64384c6a426925
SHA25693f952b8928265c9cab994022146bd065b225c6bb5ac564a3bfafea7a82df2f2
SHA512186fc71b7b723d406bf9b66c30976726c98216b2d4e7d4ea5315f25f7b52d175ae9a6e0c9d4503a4721d81b8eef331c88d1a199658ab2621f30992ee7fadc207
-
Filesize
10KB
MD5de5d39b18b04e00ebc1f25c9f07039b1
SHA1c689d0021813c6c80c11fb2d46c6a90f8390925e
SHA256d10d5e51098d2c5b309f9cdc8f0f4b76657757d587c3175119157dd697087ffd
SHA51256a5e1a0c79aa717662e1951039ca749b875f2dd89b0d320c0975c6bff34f743ae0d17b9f9b5ec0779c34890c8790e531e660ab8e7c3c31b5365984d1f5e188f
-
Filesize
10KB
MD578a9c43e3d5675f2f7351f3059081634
SHA1c3f5baeeb46cdfe3e570714f262321557880fb42
SHA25685261c4a412eb903926f16aea9f612e04e10bf12e6af64f3473c32e9208e2e0d
SHA51298b99709dd0392d28a1be5f4395c77f2d3a8248e92b7a65d2dcee7234192e9553d597f806a256ab55f1574d57f6960115d2c4c6f02f08fbe066c5c67e2eb8b73
-
Filesize
9KB
MD5bdf7b7bbd1f155700d35b93ee0869164
SHA1450d7f11fe5c0a64ca1757b3d411ec88f938ad3f
SHA25629fdcc5dcc4575f3cd44eafaee450f1f57b5cd794a739f11d8a954ec515339ae
SHA512c5f90ef422f1b68c3db7bfdf8a80410514865d65ddca32279b9e6c6a72b14e372e60655916ecac32ce980c0a7086f8faaf7e287571ef3c6fe6d7d772c04bedf8
-
Filesize
10KB
MD53f554fd31ebc62041c079c7a95fdde51
SHA199656708ccd2847b5cd9649e68ab3adf4f7ee966
SHA2568c3c9e92ccc59671466c4720d15607c8854b81bec3b1d7ca9918f643c1f5e500
SHA51230bdac3f4ff91e73e357e396f4a0071251ec3b7dbb5f69ee52cb919ab5bdfea58472aab94e628b54d1c2310672ebed95f9462d56db5adfbafc283587c747f449
-
Filesize
100KB
MD5cfc541cefe14ec4032da7f058b127ed8
SHA1b9cf6ccac4a6c5d9f2aa34a2d9c76e5218297564
SHA256ff1f51f852e5937a1bfc4a196b136759622188f79915c80db5f5ca2449890566
SHA512332f8834c534619ac5c9f42f8fc313e2ac9ab9155941d56f7a7dc467b18b95bfe5cac1c098918ead4fdc3f6c35e3dc31ddd0d3abf2154500e8c1003c35df3dfd
-
Filesize
100KB
MD558fe61472e2e866a8a7fb85ace5096b4
SHA1a5c9dc400d9c99cdb85e1ccb2b47e1ebc25dde06
SHA25635f1ce67b6f1e11de0684db0cc46e16cad9ed6a1183be806b2f2baadc9620c8d
SHA5126f5d51373842525490ebfc021f78da8a5d2d707be9e9e5c68a3666a28704a11dbb169ed049e0cc3be1d452a2da37894a63863fba26222b1304674a7710c47b85
-
Filesize
2KB
MD5562e7708e65396a05d7e1f05e6192ded
SHA15772f714d5f525289e4b83c48fc5e93e5d127585
SHA256d6122340f41f7dfc6d42d88eae7135c184433f701e18cda27489941059985608
SHA512e112b68a5cadc018e8ee647e0ef4a64731724e1ac074966a831e3577c869528c3f028b48bc3c28b89a9ec007ceb3f1766b0e32a7af83d6248c27f3bae1fb880b
-
Filesize
37KB
MD53bc9acd9c4b8384fb7ce6c08db87df6d
SHA1936c93e3a01d5ae30d05711a97bbf3dfa5e0921f
SHA256a3d7de3d70c7673e8af7275eede44c1596156b6503a9614c47bad2c8e5fa3f79
SHA512f8508376d9fb001bce10a8cc56da5c67b31ff220afd01fb57e736e961f3a563731e84d6a6c046123e1a5c16d31f39d9b07528b64a8f432eac7baa433e1d23375
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD514f9823c7f73af418659d716fc91c0d1
SHA156eca072fcba259cf0813ef67bdd8d663825a865
SHA2568d95ff19d697afe7bfd166c4ffc38921fae8434043c09c900c303841acb36ce1
SHA512a9c0547671cfa4558a2b9a1e1501e50004d7d4d1cc1014dffe8bb8e91ccbee9c611f210f93bdc5e397161d15a4181b99c98c4e380626aa1488b48a0c855a3f18
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
14KB
MD59d5a0ef18cc4bb492930582064c5330f
SHA12ec4168fd3c5ea9f2b0ab6acd676a5b4a95848c8
SHA2568f5bbcc572bc62feb13a669f856d21886a61888fd6288afd066272a27ea79bb3
SHA5121dc3387790b051c3291692607312819f0967848961bc075799b5a2353efadd65f54db54ddf47c296bb6a9f48e94ec83086a4f8bf7200c64329a73fc7ec4340a4
-
Filesize
12KB
MD5efe44d9f6e4426a05e39f99ad407d3e7
SHA1637c531222ee6a56780a7fdcd2b5078467b6e036
SHA2565ea3b26c6b1b71edaef17ce365d50be963ae9f4cb79b39ec723fe6e9e4054366
SHA5128014b60cef62ff5c94bf6338ee3385962cfc62aaa6c101a607c592ba00aea2d860f52e5f52be2a2a3b35310f135548e8d0b00211bfcf32d6b71198f5d3046b63
-
Filesize
7KB
MD5ecffd3e81c5f2e3c62bcdc122442b5f2
SHA1d41567acbbb0107361c6ee1715fe41b416663f40
SHA2569874ab363b07dcc7e9cd6022a380a64102c1814343642295239a9f120cb941c5
SHA5127f84899b77e3e2c0a35fb4973f4cd57f170f7a22f862b08f01938cf7537c8af7c442ef2ae6e561739023f6c9928f93a59b50d463af6373ed344f68260bc47c76
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e