Resubmissions
03-08-2024 08:27
240803-kcfvysxfjl 303-08-2024 08:26
240803-kb15hasdmh 302-08-2024 23:17
240802-292x5avcjr 602-08-2024 23:16
240802-29ahwaygrc 602-08-2024 23:13
240802-27q3vaygma 602-08-2024 23:10
240802-256qhsvbjm 802-08-2024 23:08
240802-24j55avanm 802-08-2024 23:05
240802-2282gayerh 702-08-2024 23:03
240802-21vgpayepe 1002-08-2024 22:59
240802-2yey8aydqc 6Analysis
-
max time kernel
83s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 23:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral1/memory/4496-247-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-248-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-249-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-250-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-251-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-278-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-402-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-403-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-404-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-427-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4496-491-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 53 raw.githubusercontent.com 54 raw.githubusercontent.com 55 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2704 vlc.exe 2780 vlc.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 4496 [email protected] 4496 [email protected] 4496 [email protected] 4496 [email protected] 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2704 vlc.exe 2780 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeCreatePagefilePrivilege 2636 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe 1996 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 vlc.exe 2780 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2576 2636 chrome.exe 81 PID 2636 wrote to memory of 2576 2636 chrome.exe 81 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 3280 2636 chrome.exe 83 PID 2636 wrote to memory of 2124 2636 chrome.exe 84 PID 2636 wrote to memory of 2124 2636 chrome.exe 84 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85 PID 2636 wrote to memory of 1444 2636 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5264cc40,0x7fff5264cc4c,0x7fff5264cc582⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2032,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2080 /prefetch:32⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1708,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1728 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4592,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4548,i,8103755897405283202,8146903578520075110,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1824
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NoMoreRansom.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_NoMoreRansom.zip\[email protected]"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1996
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DebugStep.wmv"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SplitSync.m3u"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2780
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
Filesize
2KB
MD52c4dfde95c74432886a25bf100c78a01
SHA153d3b467e3d6e63699c315768b080a1075b67eb8
SHA25617a0296f619bbb936ed4343ec861ce3e04639951c3d45c5abe6183ac0c57286b
SHA512e07df79e250bdb563b00a1b2d5a2aa0f9447f32b3eb5b32941ab227a2e6e11b23f3d31a56f82e7abfdbc58e3fd9306ef290e0a3c6fe0b1738997ca4eb6ae1eb8
-
Filesize
264KB
MD5147b67227522a5a4b7648b463eb449c6
SHA198d8e2662e71ad35ab5f8ed5c28f2c62a322e16d
SHA256a9850d2bf883101440dfd1e90d599d7e7368ef694588990ae54f5aec54916b96
SHA512d6b3971287c52ce88e98db5f15b1366178e932cfce40ef1e5a7ebafd0d560ab13f31a8c8e353285b0d4733e52ef6dad75cf1bbb9e12c0dbcbe525ccaf2ec916b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6d466df3-8bfc-43c0-a0f0-f7ec22bf29bc.tmp
Filesize1KB
MD534060e522d6591c7a77a8fdd0731e329
SHA1a1e04c5275f9175183c31f26774412c67b6e94b7
SHA25621f72a747bf56977f3bb987ce6ccb87d3fc2af6ab1d655d6883edcd20850cbb6
SHA512d251714c8d477f1decaa20e4b4f689f34a6a799f53628ff1bfbf72df766b500a60c1faa10aea052b6c61d151e0a936a8cce9767bd724a14926de1adf0582a498
-
Filesize
2KB
MD5340418ee77c6d68e369463d33160aeb0
SHA1c01372d79eda6f4814bf3a2633554d05370657ff
SHA2567e37dbdb2b67d9fb1c56d83de47ccac9e0610b5b3ecb5e013fb3a75ef267b68f
SHA51234c492294c54f6212f2f9ce87654cbec843a980ddd247f5e48b39b38eda2cb29c8f9603e0c2707fc7591a7e29c9c6d462adc915d6993da7c5730e50abfefc316
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD57684e895df7baf653d7957eee8aff135
SHA1fa2b628d70d82f90e5f3d53980d488f3f8c37e49
SHA256f583d06331f2c6f839fc820cffab4166a4fe25730195c2a081c64971317605bc
SHA512036ea1ac1762c0caca859d6dab3eb6981e6a8c7a91ccaf9b7214d2e3e303557d79d62dcd836bff7a2299d64e904b5fccc947a87fc5f73921a41014be3b39f51a
-
Filesize
1KB
MD57cefa71fff4d86010d85c09968ea7073
SHA13f34c090e373a2a9a3c9d968931bb71834210d4f
SHA2560e54fec9a5396c9b7c5b576806303d15586180ad6db90f8191f119ff3403efa0
SHA512a400e364ba5b18ab4a7004a1b532216c7c1cc69cc4d784ab9d0f492d51220a0047dc943c958b01733099538f32a9a136b5dae644b0a40c6e3431475abd1d5727
-
Filesize
8KB
MD5599ccb66fa2040c7cb58b67e580a86f5
SHA1b2e566ba6e5e32139193502eed70bd54b444d6b6
SHA2569fa2fc97c1f45a60059937dc1ea414b004caef3b400378527010980235947162
SHA512934004f53c3694893689ad77861809773a023f23266e4aab81dac2fa50fd57a9f6c852a82bc9cdadde47b393dabfcc05d9f5e3605ce7e9f5b65c533d214ed9c5
-
Filesize
8KB
MD5a6b93f67e2f26d9bb3934caf45fba556
SHA1f982aec29e926b59e84a576f0f6d0eae1d723ccd
SHA2567adaf7117b0c5b406ca50abacf2ae7e6124d1db543f6bebc3dd746dbbe13f8aa
SHA51269c5a4343f783f0035fb277d4bd2f1c457c0e836ff76cbef196a760105ad0a141c3994c740d83a67e17a58010fcb76c862d9a6ab9556935f0b734799e0169f4c
-
Filesize
9KB
MD5bc01d59663f0468102743bd9276c25a4
SHA1b3a38f8f350d231cc71a2172f1505a517a177c6a
SHA25691bcbc93bcf7bc2dd678fa1abdfed0ccd90874084f96e9a5660dcd2f4b75f7c3
SHA5126562b8f4e9be3cb5aa4b17b37e5cdb4ba5485bf0bfcd06b3bb6816d341ca5c796773e2c6d1af75351f97118e50fcbc9b81be4acfacf3495ada3cb36cb345eb9a
-
Filesize
8KB
MD5319b388adfa8b1518cb867e187c646da
SHA1bcab17d2a38afe42481bc78e6da6019f373a8594
SHA256aa887cad56f8a33228adabaf628dd64937932a19d617c447ef4a816c112d9d80
SHA5127ff662e170987d0f0b410958eebff04c71abc22ed6b06386a5b55d4c987e7a97af8d8c12d088cda824ffb7eeffe81e2f20a6e2f0f8bd0fdc553e10ba424d38a0
-
Filesize
99KB
MD5a10c74fa2eafa7d86f7a1f8bf11518c9
SHA13a0e3faa103b6ef37d807aa208c50fbfb6364256
SHA256d7a98025da13865fc3ac146de7739d813f67b4b22040b02b053647be75ab2fad
SHA512d6dfd809120743ef9af372e78f3eeb0ec9dcaf6a02a1657b956f471807066c9b8536cf9c4707cbaf5787af2ff07b9a639ce28d22b92354b05aa040f86d2a98a1
-
Filesize
99KB
MD545f4bd1e15dd4b52e718364625831c71
SHA1d547fcd3c0e2fef2f93d146514d23d5b543a68df
SHA256e9e46e72d1abcd7127cd1d3694546ef739924b52043c98a12a42bea55bc7ca9a
SHA512f9f5c9e82d7bfdaabd1bb274750760d146b47782ce0805fa85c33b919ae34d8353f0f76c04bb339d96890a85953a130145953c554fc3a9e586fe06ec4aac0c93
-
Filesize
99KB
MD54c7696f8d71a782bee3cfa5777f4a803
SHA17d2e83786fafbb64cea2b3796fc36fc20f439984
SHA256f87e5b7abfb3c84751d695099582db93f4140f70cc6b753d6d9b733b0ed7539c
SHA512d98b7ce8ee7c06a77946cbf6672681a56e076d0c993ab53da6f73532725c3b76bc185826f68a3ffd359bb4df6b1a46466e0beb7a8969513cd6556f86c973d87e
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
529B
MD5e6b88c0a71f73e12c6a0fb11d60d4cc6
SHA16d458b04a79facf1b8f6ea4027506f3de9be6f6b
SHA256596c6c6e34db9af541b524d6cd0da48557ff7a725443b8628efdb9bc87ebdeb6
SHA512d22d34cfe9aeaf60f8c074ad68e26fde9ec91f4292be0d436bc0ced9b0dbb7d69986368067a7592d7aec79b67ac8f6230b2a4314d38f00cd03757fe64eada381
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02
-
Filesize
916KB
MD5f315e49d46914e3989a160bbcfc5de85
SHA199654bfeaad090d95deef3a2e9d5d021d2dc5f63
SHA2565cbb6442c47708558da29588e0d8ef0b34c4716be4a47e7c715ea844fbcf60d7
SHA512224747b15d0713afcb2641f8f3aa1687516d42e045d456b3ed096a42757a6c10c6626672366c9b632349cf6ffe41011724e6f4b684837de9b719d0f351dfd22e