Analysis
-
max time kernel
905s -
max time network
895s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 15:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1nyA3VVfGf65kiCFIkZDSIdU0mXteEHO7/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1nyA3VVfGf65kiCFIkZDSIdU0mXteEHO7/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 13 drive.google.com 14 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zG.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 3460 msedge.exe 3460 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2288 7zG.exe 1212 7zG.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeRestorePrivilege 1504 7zG.exe Token: 35 1504 7zG.exe Token: SeSecurityPrivilege 1504 7zG.exe Token: SeSecurityPrivilege 1504 7zG.exe Token: SeRestorePrivilege 4828 7zG.exe Token: 35 4828 7zG.exe Token: SeSecurityPrivilege 4828 7zG.exe Token: SeSecurityPrivilege 4828 7zG.exe Token: SeRestorePrivilege 3568 7zG.exe Token: 35 3568 7zG.exe Token: SeSecurityPrivilege 3568 7zG.exe Token: SeSecurityPrivilege 3568 7zG.exe Token: SeRestorePrivilege 2288 7zG.exe Token: 35 2288 7zG.exe Token: SeSecurityPrivilege 2288 7zG.exe Token: SeSecurityPrivilege 2288 7zG.exe Token: SeRestorePrivilege 3008 7zG.exe Token: 35 3008 7zG.exe Token: SeSecurityPrivilege 3008 7zG.exe Token: SeSecurityPrivilege 3008 7zG.exe Token: SeRestorePrivilege 1212 7zG.exe Token: 35 1212 7zG.exe Token: SeSecurityPrivilege 1212 7zG.exe Token: SeSecurityPrivilege 1212 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4228 3460 msedge.exe 84 PID 3460 wrote to memory of 4228 3460 msedge.exe 84 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1080 3460 msedge.exe 85 PID 3460 wrote to memory of 1668 3460 msedge.exe 86 PID 3460 wrote to memory of 1668 3460 msedge.exe 86 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87 PID 3460 wrote to memory of 4928 3460 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1nyA3VVfGf65kiCFIkZDSIdU0mXteEHO7/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd15f846f8,0x7ffd15f84708,0x7ffd15f847182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2132 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13156405387480266009,8127403574385699732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:3760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:636
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap19351:118:7zEvent235301⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap30700:118:7zEvent691⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap19525:114:7zEvent235551⤵
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap29648:114:7zEvent266051⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Chained.Together.v1.7.3-OFME\" -ad -an -ai#7zMap31729:114:7zEvent202891⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Chained.Together.v1.7.3-OFME\" -ad -an -ai#7zMap20914:114:7zEvent136841⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
408B
MD508cd442bc8065e6dcb366a94744ea82b
SHA1d497d903574d812f709ff83a90c0dfbeb9209fd7
SHA256c6e4aa38f90a207f0ac19cd5766cafb68f2c58f14f66eaf638bca2548cc4c277
SHA51232945137289d5b1e9d330dcadb2c65d9f94b5e7100a58d004944a096385b0dc5063fb3f0ce4f80e720d52cd6ee4082b32d1b62877a5ad9104d7dd80b8f5f1af7
-
Filesize
3KB
MD50215f90c5a379070be2b85e537fdcfe2
SHA191762e27e5014ee863d0f1ed2eae65f59d7a4265
SHA25666addacf00ecc2536b36ac19011c5c0fad4a32667e19efb6dad9725112fd95ca
SHA512b18f205b39de7a96d8b13e74173b5b7be1adeb79e7124a28566d37c6e3b297d44fa60b99495b2b364bdfecb0229f75726a7ce6e03eb8956b7719398c3b434462
-
Filesize
3KB
MD57c1d00412c5c92c2014bcefb6240b4a2
SHA131be30d95bd67852d195a7847ff9406dbf0c6e67
SHA25639f7398e5ba63dd9b8a53edc48b7fa1b9fadf3e7c06388df332c51497ceecfd7
SHA512950d10f4001a647c4ceaa2338cac6793bc8260b9d84a4dabdce4681d7dc27bb9bff9c0bf33db78df360a853b95c5a3ee76e65b124c98d5681fef92281ae35426
-
Filesize
3KB
MD54d190d8a8108192a80ab6264bcdfbbbd
SHA1cb7ecad521da3629bda7a4f425f19f917ec1369f
SHA256a9748c7523b8b335a48166498ba272ea30feef42bfa17b2410dcf19c660e58d3
SHA512ab8beea0e9c9cf88d7c7f5f828a06ae9992bc697c2e4a7e09c92b8d7b30fd8af7462e739da09281151f73bdfa6554832ac9c2b5887fc3fd3c740118c839fef9a
-
Filesize
3KB
MD5586770d4168f71130ebc9e1459001390
SHA1948fb8d76ae93660c7425c4f3d730df05bf862d0
SHA256e96a768470fca5da8c78abe985eba1fd0c2b1d86d6b88cf782c281d2c59e82e5
SHA512121d33f83936a91e0ed960da7eb27acfb1eb2e44eea9465685bc4821017e3df0c8ad56c0710c12b7141ce53f1352f7e6e61f39b87fbc1a4652ddaa33d5429302
-
Filesize
3KB
MD5372da62e64905810e865e5aa2268ca9d
SHA1a19f5bb86f73661d34456b169e4c51669b0fa252
SHA25636cd6c5f4e922f618781f24c0d8d52b0120110627bc154d17e39bad3936bbfd4
SHA512c8baa8f86890b05fec0e942afb40f7df2aed9c4c8242bbca6293784235374674f371ab836acc22fb86960ca0aebe95e4bd97b373af4ef52cbb04a9a209b24124
-
Filesize
3KB
MD5a5f865c22595214402cb8d621d8cdb69
SHA134d43fa3e4e6da092c0739225c59b2d6356d758b
SHA2560cfbc5333db7d09a34d3b0cc84b954f6cdea8a71f72ed5a70949498c65a0a7ee
SHA512b8a4c70753f0f5d658d822e74d0da224018c6d99761aa5bd1a1bab2ba06130c438b9f342f8845ef377b714492deb958e55d2ad046f2bc2e7e61e4e372125d306
-
Filesize
3KB
MD5a4c75e341f12db9f43670251ce007f4e
SHA19a39d0dc4bc69ff40e668d2b3b1087dc1a65aa2d
SHA256db21edef1f4fefad87fef794b32b86293afac6779eb295dd44f24cb631fc5578
SHA512392be5dab386b10e915b6ceab76f2855f886a438b42d7ae10521ea3eafa5328ef684d2135f32cbb6172a96e71b1dbb7de8893cca0f902112ea025b3b77e8b547
-
Filesize
3KB
MD5f155a3f02177fb823ca361eebeddc9a7
SHA1032e436d9a01023fbeeedf9e2503e61d26f97919
SHA2568281f997f43cd6d5c4fb3e1e0d6aab28d4bb28a9602983020ebac792ebcc0605
SHA512d9413dc29ac8e7a6df3d89e996e251c109aea9006d5370290cdcdfb7d43e94c5f3fb2f4e48b4b875ee22b9fbd118282db1f63c81af467121def4b6c44ba5ff53
-
Filesize
3KB
MD553d68d430c5c84d02117bde6d2686c5d
SHA1ec2103cc30050610500d43c7b9b5b55ea6c6a95c
SHA256e9244a39b92c1b1757daf17c078ee2790a11bc12e47de6602fb55ae0029ad806
SHA51243678a97f8cb7200e1a015f804235fde4192a7cb973bb7868f9c38e204304f91ab00afb9fad4ab4e72664e7a6aadff0b3c95313f646b5748777a8a274f822493
-
Filesize
3KB
MD5c24419403e185f20782bacfd13e7fe72
SHA178d8fc5ad1684912feb102a57ac4e50249c94168
SHA256fda835210f37b330bb04386bfa95342f39d61092e09617bb65b222a13bbf1328
SHA5125a6faa55b3b5ddbfeb929847488ef587fbaab4cba63618b2f574e4bb9c88dda2aa7c0257a6641e80165c9f2f7ceb7d32e20d5875b7acf9bb6da4dd8714b5f6e7
-
Filesize
6KB
MD53a52e0d3ebd871e0aa5be6c1863cef91
SHA1196d091c2231feefbad0eed901bd7210c6af4bd5
SHA2564e68191c160c2ff176cb2fb6d271235e5d2dd583eed5176ebc64ca3276245bd3
SHA51209acb6d1df99555df4d56a5cf0724b9c2356ed1e9acf6ad609fb98a37f3d6b5ea0b0ccfadc5817cf25bb71dde5a34e6f7044f3b9775e33c8ff0dfc1e9cbed488
-
Filesize
6KB
MD551ed2d3fe8cf32c7974fedd492b7a288
SHA192557d3e630d2552c43da47ff99cdb9669a69ee5
SHA25686bfaa1422d34765c068fa06731405c51f47ff63c78a18d1da458900669aff23
SHA5125caf709a14d699db0069f7e1948dc7f99581922b27db469d88de5b3fb478592c949d4385f171974a78278ab15ccb1950f00b10f76ec935a960e67fdcb5de2c56
-
Filesize
6KB
MD50a43a7c50c29b936ebb5e04877d2a8ce
SHA17c665b2e2fdb2514de2398c6434497c9d6e85821
SHA2565e3f21c60fa8867588b7cb0395f9536005455ca9d7b989c67a79add4597f4377
SHA5126604c2dd3dd14eb16d0862b0cd8f8db6063ad1c619cfaa7f06b8a5b090003ad77b0f67d59408cc74d4a7aed4b5094d52dd201d3d711d521dc4fd5b4489f24b4c
-
Filesize
7KB
MD5fc6f0b7a2ad29ab5326d6032cc3ce7ff
SHA1e72c57639baa3f7c7079af70d2798cdd0f77bfc1
SHA256954004ad163b2c4a53594405e61f5ff15efe3da834640e56b177ee4dad4becf2
SHA5129a74e4519223e78edf3b6e154e207a60110cb2b31c717e61feb6905675162e08f004cb84f1f5c201784f8d0822601af8fbad9f231207f9ac6613c6cd23a33a42
-
Filesize
7KB
MD530579939eb778a6a6231edd797e36543
SHA171f03a28e82883c8494000e2bbc15ab9a2af077e
SHA2561b46144f86932323a04ee7d1980990b4602af0cfd26c759bfca039cb7f8381c6
SHA512d4964b52e439c8831664a17447531abc6b0eadcfc439a15a134efd89619f1a9de2f2b3be3e79bd2e5c1837eb187eefd0122500ba82aaac299e75bcc07af91366
-
Filesize
7KB
MD5561ef7bae20cace582def4f33560f73d
SHA1d0f3092c52b88e9a20e3f6e94bef470e6d4cd961
SHA2560f59b2dd87a0a414bf817296bd81c171c647d65052baea2839d4ddbc1bd0101b
SHA51240e6c6262f58298a15ce581c80d3fc0d069ce60529c5c26aaeef2bc7273ee8a9d7189846a33e4fbc0179197159b27638b689613a1053c464a37ba46563bde4d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b79ce0cd39577cdee14547cab26a8dd9
SHA1d70f279de982fca1f64cd8912ebad87358973362
SHA256192d9dcd73d8f2ef6336040161fa3859bdb1f7cf058b28076c9ec6476d0ad63b
SHA512124a7056d2ab48bb3c512006bd1dd8db0e664c733653aeb046f20dfe3f067a5c0e7a7bdefba46a8c5c759154803613f998486907cf56ae43427bebd642def516
-
Filesize
12KB
MD55d37fd5b9a7ed3d2115b86949ff407dc
SHA1522f49096ecebc4cb85772ae57dc8a13dd2ee749
SHA2563fb05654b166439ce4e36feb4f0d6cb150a3ff4c77ad64f0494936b9944d1260
SHA512ec8abf891ce20c9b09d90a5e6de1d503883349fcee4ba2384a61455e91cf753e707384bc17a2b1585e5549a505e67860b60715e47ac2f4f9a082a406cd1f3c29
-
Filesize
12KB
MD580673585c410a9f969315ce865030d7d
SHA16876d69baf756246502edca9381e312ec609f126
SHA256735e64d6d45bf46d5950eb09b2cbdc9bc156d3f9c8a477e2d14237dd71125e37
SHA512fcf1dc0bebf5340567368eb3b0f2308cadce50e8954859e5f6f0be1756e1af35166d0c4ba88f347ec99924ce97c99e7cd89b4fb00d9f69fd5ce04686c32b6b52