Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/08/2024, 12:19
240803-pg7lpasfql 1015/03/2024, 00:25
240315-aqtc4adf33 1015/03/2024, 00:20
240315-amv3hsde39 10Analysis
-
max time kernel
74s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03/08/2024, 12:19
Behavioral task
behavioral1
Sample
LB3.exe
Resource
win10-20240404-en
General
-
Target
LB3.exe
-
Size
147KB
-
MD5
1973ccbab82020881d531ccd1f2ca48e
-
SHA1
7e18f712e26ea32b0e8aeb4cd3c958eb8d32dfed
-
SHA256
d20d22dd302f51341405794a8fb3866c234fafe614b67b55934a9a959a4cd847
-
SHA512
67654e67afe6a3e1ddf335dff4b976e254c45d8046853607cb4e98af6cd43accee8f2e35e296b932385bc9a6b7fed96ee4be6e113457eb5eb057bd8301f476f6
-
SSDEEP
1536:PzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xD8UhzyIccE+72p2Kbm+0ep3PeAM:wqJogYkcSNm9V7D8URMcS0ep3BcTT
Malware Config
Extracted
C:\xcEElHqGu.README.txt
lockbit
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Renames multiple (530) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 4444 B3C0.tmp -
Executes dropped EXE 1 IoCs
pid Process 4444 B3C0.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-873560699-1074803302-2326074425-1000\desktop.ini LB3.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-873560699-1074803302-2326074425-1000\desktop.ini LB3.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PPyex0icugytud72spvjwhzi3yc.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe File created C:\Windows\system32\spool\PRINTERS\PP6y3ymztcydojjhg2c8mmk1pf.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPc537wgov9f81pyc8aygvr67zb.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\xcEElHqGu.bmp" LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\xcEElHqGu.bmp" LB3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4444 B3C0.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LB3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B3C0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Control Panel\Desktop\WallpaperStyle = "10" LB3.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133671612024542235" chrome.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xcEElHqGu LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xcEElHqGu\ = "xcEElHqGu" LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xcEElHqGu\DefaultIcon LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xcEElHqGu LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xcEElHqGu\DefaultIcon\ = "C:\\ProgramData\\xcEElHqGu.ico" LB3.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3712 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3708 ONENOTE.EXE 3708 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 1980 LB3.exe 3708 ONENOTE.EXE 3708 ONENOTE.EXE 4656 chrome.exe 4656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp 4444 B3C0.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeDebugPrivilege 1980 LB3.exe Token: 36 1980 LB3.exe Token: SeImpersonatePrivilege 1980 LB3.exe Token: SeIncBasePriorityPrivilege 1980 LB3.exe Token: SeIncreaseQuotaPrivilege 1980 LB3.exe Token: 33 1980 LB3.exe Token: SeManageVolumePrivilege 1980 LB3.exe Token: SeProfSingleProcessPrivilege 1980 LB3.exe Token: SeRestorePrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSystemProfilePrivilege 1980 LB3.exe Token: SeTakeOwnershipPrivilege 1980 LB3.exe Token: SeShutdownPrivilege 1980 LB3.exe Token: SeDebugPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeBackupPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe Token: SeSecurityPrivilege 1980 LB3.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 3708 ONENOTE.EXE 788 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3204 1980 LB3.exe 77 PID 1980 wrote to memory of 3204 1980 LB3.exe 77 PID 1980 wrote to memory of 4444 1980 LB3.exe 80 PID 1980 wrote to memory of 4444 1980 LB3.exe 80 PID 1980 wrote to memory of 4444 1980 LB3.exe 80 PID 1980 wrote to memory of 4444 1980 LB3.exe 80 PID 1740 wrote to memory of 3708 1740 printfilterpipelinesvc.exe 81 PID 1740 wrote to memory of 3708 1740 printfilterpipelinesvc.exe 81 PID 4444 wrote to memory of 3796 4444 B3C0.tmp 82 PID 4444 wrote to memory of 3796 4444 B3C0.tmp 82 PID 4444 wrote to memory of 3796 4444 B3C0.tmp 82 PID 4656 wrote to memory of 3104 4656 chrome.exe 89 PID 4656 wrote to memory of 3104 4656 chrome.exe 89 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 4912 4656 chrome.exe 90 PID 4656 wrote to memory of 1568 4656 chrome.exe 91 PID 4656 wrote to memory of 1568 4656 chrome.exe 91 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92 PID 4656 wrote to memory of 4664 4656 chrome.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\LB3.exe"C:\Users\Admin\AppData\Local\Temp\LB3.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Drops file in System32 directory
PID:3204
-
-
C:\ProgramData\B3C0.tmp"C:\ProgramData\B3C0.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\B3C0.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:3796
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
- Drops file in Windows directory
PID:2320
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{91F7D01D-C3F9-42A6-966F-4801F47C45FF}.xps" 1336716117201300002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\xcEElHqGu.README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0xdc,0xe0,0xb4,0xe4,0x7fffbc2b9758,0x7fffbc2b9768,0x7fffbc2b97782⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:22⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:82⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1704 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4432 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5276 --field-trial-handle=1824,i,15127310383755037783,10780061860312005566,131072 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:344
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5fde6a42469caf9e098ec99525561a1da
SHA162f7a2d2d4d38ed563317fa79fda7198c8465c3a
SHA25695053be4ac0980be05a0d1f94adc750ae089244c396d7c05ef3fb758e6346394
SHA5129f226efc462f6561a035144561a0dbe4082ce36e484d4af762528e16c6692322db866ebb3108b54038750bd1a0eaf890cdf16bbbaaed51cef7da63df290988fd
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-660EA6E2-C14.pma.xcEElHqGu
Filesize4.0MB
MD545659376c43fd4dd61075ef02b286a7a
SHA14167098d6c69cb0b8a79b8887c02f53cda291a56
SHA25622cb7b9fe9c21d74db4394780b16e1976b2b3ed6cc60712e63db9ad872f50030
SHA512f4cb45f05a25be6167a31e7bb237672c9d44ad655391950df52c6bb573a1f4b11bb1065a57028d63bca3e1893031188d30ee8fae535a0b4bcebda47f232a3173
-
Filesize
40B
MD5d41f1729bd1a44396e3f9846762df6df
SHA12147365adc327290b3667fbd874e9f6cd42eec7b
SHA256dcd2ab55cf4a678558dcafb4e7ae2b498a101aada8f53be000af6c8e9a3f67b9
SHA5120e5cb2ae5db14a4103ef609f8c7c5997c975b4b2da5dd985d2e78d549337e7cd2321460d9098a96a29950b7969fbf55040c7013eeb8239a3ff408c2ba0b6af9e
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
168B
MD5bfe18c3341c8b25e2ab0e5df540b301c
SHA1500dc66286d4e6a8a741c804799f5ae8726a1091
SHA2568916130bc60e54dbcd85198cfed8f8d82d7eee35d0540b232b8c20fa84e3899e
SHA51216888f75a8f069bddb2aca6cd68102920ae007b88f920e5088224270dfbdca60555759aa95b6e041bde3356e60dd8c0fc3558c4a39048400ed9d70446605fc82
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
193KB
MD5ef36a84ad2bc23f79d171c604b56de29
SHA138d6569cd30d096140e752db5d98d53cf304a8fc
SHA256e9eecf02f444877e789d64c2290d6922bd42e2f2fe9c91a1381959acd3292831
SHA512dbb28281f8fa86d9084a0c3b3cdb6007c68aa038d8c28fe9b69ac0c1be6dc2141ca1b2d6a444821e25ace8e92fb35c37c89f8bce5fee33d6937e48b2759fa8be
-
Filesize
1KB
MD58452ab41aa551a459d9520b9eb4ad5de
SHA148c2d162dea382a5d91b237a1a7ef3965223c5c4
SHA256d118f0811e75c76bd1822a37d58fbdfa1d7d8e82771cf2587a6a16010970152c
SHA5121e9fd5353a35bb00864e497e9f17b89982177e1ddc62708cbd16bed5f159786e2501fc944f64325ac308c467d4a9d93df0c8c676312e801c1f585fdabc82b7f6
-
Filesize
371B
MD5b4bcf3a0a55a15f751eb4d6c6c72e62f
SHA104795ed6532c9dc6c577a7b61277f3143740166c
SHA2561bd034757520fc50204534c8613a6adb612f0db5853f4f8c8732c647af85e421
SHA5120cb3beb4f5476a2854687c4739178ccdc0e24a62d9dd6ea81a4459715d5173303fc6c59a3553d63f278aeb4ad51a19d274ef36b343b75e82d7bbc7a297ad0d6c
-
Filesize
6KB
MD5d1f0a6f7ddca607176536ab7bc66e074
SHA1e17a53faf273d1b8ee96cc95e349bfcbdf057deb
SHA256cfb273b6fa4a7ece763e9a59307bcf3d363c560501518653a0da3c7a34a55b54
SHA5129de23a7bcc45da5dd5cda3cc143e72fdf9fb7ce7ef2009a6cd97e7b4b752f48ba8bd9e6971d223da5d3e0c03f0900e7a283af3312ec2845cdb81ef734e31961d
-
Filesize
6KB
MD59e2caa9ad187230d63bf824e04b098cc
SHA1c848d4f25443f9e5d139fa13f7491169d5e2a1ab
SHA256b7e2b591ac8c1d6f724c5b55798f62eba8d793f1b87c819c882bfc8204ffd2d4
SHA512d257bc830de5777c9e9b8ac8d9a336ce53e5cec9e11df23594d8487906e8116f28b480409789f798c0f7bd660fbda9ab830653fc31fd450cc4e6d284368c8867
-
Filesize
12KB
MD579fbda28b07648cc549ab2d073c3c913
SHA1a43c5413d6803b13a468281b32bc02b4b5606b71
SHA256c798e3fa816574cff5b225581faca499ac81f492288473a6c114b950b73adabd
SHA512c9f0971ec71bf116827ec6d4d88cbc8c9aefa766c5a5a4571a7982212d6e9a544ba57ac0eb2800d48ecf77fefbb7330ea61285a9f11bc0b9e15b9b19e2e6db3d
-
Filesize
160KB
MD596ec6cb8a793df3d1db172e37fd6e621
SHA1e0fa4e490091f80ee32d120bfea196700621943e
SHA256ff39b63d325c14fbc504b3bc3b883b2cabcba8aa6e283802d8f175fc740dac32
SHA5122e74c8703a36f0e3d52099d8c47bda4f6640c99aacd854afd71d279db030c539257bd1495cad72a15c6d55430c2639ec357e967ef5d2a361c503d52ac9a06b74
-
Filesize
160KB
MD55aba07b74c3c46357e14542829f5b3c3
SHA14da4a654cafc2d920dd1d483dd337b4db490b7c8
SHA256450bcbeae4019b8b6c876bfa2ec25b400895584c8b69eaafd558917879a5cf0f
SHA5129d7ef16d6b0d5bc9663e666e7c3052fb24d21938db28e14ddc17bd71347ad219649a5000c1142822a6779364ac980450736ebd7cc1adf2a2fcd9db97828ec8d7
-
Filesize
947B
MD5bd8d789c67289a76df7bc11264333074
SHA17faaf60b754768e8df61fa2c0496df4d5d1e0abb
SHA25661d94a1f1492dbd4c9e9ebf18ed68b07002d6190ff3299ef5d481aa4309d87c8
SHA512e1f50b857cc428cd5926c8a816812632c9404fce1bd7a85d82ef42490b45b904824330eec51407fe339596947a42e646f3cd3f451e540f12438ba0ae54a7f247
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
147KB
MD5f8aa6549cbd568f1b91157a293d80a11
SHA14f849843d834082f7600e587118ebf9418f1484b
SHA256fdbc1542bc96cd14d3783a78916462a2b32c21d4d3b423559bae7e9448b6b437
SHA5120f778a763f7d4e9f5324529fea141ce2602c5dd2866d76f8c04d10162ff04cc67a90aa8b288d588755974cd052db637b3046c543662924271c8bd3631a2ebc8f
-
Filesize
4KB
MD547303b6340156469f273124e5d16b1ef
SHA11dd31a7e38e7c9fbd9b82d5987257f6804487192
SHA25639e14f03ab31d1594746f49481159e2c9cf40afaee1339e424601f426af5ef13
SHA512b86fc163ee1db9b151eeb0be2f83ec1998743dc80e0222ee422498695cb5502e40b9c1f996d9dec53e9b2cb3f358f999f0036bfbeef7edbc408ff45ed44099d5
-
Filesize
4KB
MD5f7a103db0e43909fdaf7d4e1d6fc5d16
SHA1e6bdb54e255456520379c88cbe460005f184ca67
SHA2567bdedd63e5981641903176ca0c52db80da9fc3c24b88b2e6a5c097262507639e
SHA512e7c5572391c9691f2be29cf35fed445627bc4224c1f3033eb81ba94b333761f7326a795728f8cda8e8393c969ac9fb1c628f6b692e77c7e7434d71fdc6dd01d4
-
Filesize
1KB
MD57fd2336a4cae4c2f51bb0860a6748860
SHA169ef22fd3afb86945d371d4be0fe9c507880dd1b
SHA256413dd9df6327c861bd0ba99a1e99b2b00b75961230d8b499c993419da1ecca29
SHA5128791bd4195522517edd5a05cec17473fb01bd9865d4f4ea9966ee105fc0dc9d720c56c84af278d3bb5b31915aba678b7786e086f4890ea138f2ff47f0288c523
-
Filesize
129B
MD5690c19ebd3fa368f50e546a05213cd8c
SHA1b29bebeffde46f5b3b7c8b7530cd1d4de3e1a917
SHA25662b109a4ae125c1b82cf290a9d68a4e58d543f5af15ccd8bdc546ebf176ce751
SHA512b23446062c3be10f119b0252357e8cdc5b5cc59be08f8809c24e8a4e5a283187c5dd2ea4e30801ce17cd41b1e2f7efcfbcb25eb37a3d2ad39551ff8402692777