Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 03:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Lm3Le2a5BgT-_2JPJZkf0dH0Emqpo_cZ/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1Lm3Le2a5BgT-_2JPJZkf0dH0Emqpo_cZ/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 4 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc7357000000000020000000000106600000001000020000000f85323c8b619b004d57aae5236c565f22d49d67c46d0db2fa9425641cdb0b816000000000e80000000020000200000003c93b551772aed45729cd8213e07488bfa4269041ecc5e9ff9c2a97c1497d94820000000e98ccb7a1d83ae8f90fc8bd29a55ae8860be6486b551fd84886de51d0d0d38124000000035720cda47ba42dd07b396621dff5fb5d16c1590a51ccec8e3231219e02d55b93acffef647643fd514646a89ae67ff4d05491948ee176985b950b35784f87fd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1391548481" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31123173" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31123173" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31123173" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429592500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc73570000000000200000000001066000000010000200000009ada9051b4e74aef8b2a9f392ec759952cab4f75ba127a5319d809c90733115e000000000e8000000002000020000000efe1abf65bf572ef09be0dac401f19d7c46619195d931fc2d4c620b44ca4456820000000b9ebed6e88707c8b6d1e98872e7e22484b573d06bde78851c1cb3d6ae2d93c0d40000000775607810762ed3a35eeccd4ff087a94541ea39207c49775adef3b4ea1783fc0e8040a665bd765eaeac3bac01014ee9a1a7d5cf0c194324e7af1c7bf10f69c9f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0630a53e5e6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1391704668" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31123173" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1391548481" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1391704668" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7DEEC4C1-52D8-11EF-8D5B-C63D5579F9B2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ba0653e5e6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673010753455347" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1276 vlc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4868 OpenWith.exe 1276 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1256 iexplore.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe 1276 vlc.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4868 OpenWith.exe 1276 vlc.exe 1256 iexplore.exe 1256 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 2204 3316 chrome.exe 83 PID 3316 wrote to memory of 2204 3316 chrome.exe 83 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 4324 3316 chrome.exe 84 PID 3316 wrote to memory of 1896 3316 chrome.exe 85 PID 3316 wrote to memory of 1896 3316 chrome.exe 85 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86 PID 3316 wrote to memory of 3920 3316 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1Lm3Le2a5BgT-_2JPJZkf0dH0Emqpo_cZ/view1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe0743cc40,0x7ffe0743cc4c,0x7ffe0743cc582⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2348 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4448 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4664,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4988,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5500,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5692,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5332,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4600 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5688,i,13074569532372155717,3233903872571384328,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2692
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5072
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4868
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\DisableFormat.mp4v"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1276
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Pictures\JoinMeasure.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4741⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
312B
MD5e8f32102f5500ebc42b9c357d5ffcffa
SHA19c4cf3ba09047f6fb2caf94e6a614ffbe77a88a1
SHA25669e9153f43c803be8c4f3fe64577be22805e8a649a483b5b3be0142fa4206ac3
SHA512e02bd49a0d25323f0d1f6bc5de3ebfaf9a2c203596f1cb92670b06ae03c1746b1bb6d373d4eff02bfbb999571ba70d93fef4bfc18405443e16a8a53064a569d1
-
Filesize
432B
MD5feb5c4dfcea3b07953378adcc0d98b63
SHA10e66ce68c4ef0a9f0a910b887b9fe2ddef8d0a70
SHA2563becbaeee5d07a300ff7d30982f748f081e4ac5380d58034baf8226c34ac851e
SHA512c308de8eeeebfe154927c147eb5c910a4e305e621b29403b6033e760cb39799a7fab6f9919e7a4c01410a99fae22c9a206505acb8516df91a91f9927cfe3af1a
-
Filesize
5KB
MD54051cdf74bcf53efd3f666999de273de
SHA1dda833dfb5c8b93f99f9fbfe339bb0672eea5510
SHA25647aea437ecacd325ac47872987553fca0c8b8c5d2df39cfc6c7e05a5b290e4df
SHA512a5283cf7539190f2cb64d4b9f111f9e9c8136df6d7dd81580db8c9c4988504577c54672b2c90ddea0eacbb86c8ff6d3f84f8521d6e0447f6a3bb9c1d2d367264
-
Filesize
4KB
MD56e73c4a510c8d6d26baef614c55c5f13
SHA14f75e97b26b5dab02e6ad6826e920d421989efe5
SHA256f8d34f38bdbff2a259190956a8b4efbf1bc69b60f5f4fa199678930a923e272b
SHA512fd46fb167013d44593d8be9358ec694f9449e0acd02689036b47cab113e87fe5e3fa7a51459762a5fdbef99990bb3a771367f3853488205779bb530d7fee6f59
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD571eff42939e67bfeb8471c11af3686c0
SHA1de179f5c982b3e8a457366c259e93f00abc3e8e1
SHA2566f7616b8525cf82dd63a8066a32cb2b294e10411515704bd6f19ea808f0d61d3
SHA5123657adb167aac01f2937ad04906f213c96f9999e08cc539e8dd1625adbe267738ce294317fa69970d399679d9e155a9ae751bf349bde9d66eef0e71ce75a0159
-
Filesize
859B
MD50af620ac8d918f47070e6fdf2dc8e312
SHA1dac1175c4c54c51532e2c1f71050a961f8b1a307
SHA2562fb08699cfdb1b8b1e21cca9de545fc93d264efb56ac1b401e0282327c620a0c
SHA51255d5b1f6ce1e4d7f41e125955b89f5d80f456b0b68a7a1563516bc08d3f0c5bae0fc991bf37b3c31417bcce753addc42f36af5fdf76ca88e6488aa22e5cf4384
-
Filesize
859B
MD58b5b66e3d60b211fe8622f01517d2b0c
SHA189b343ded2af98b62dc2cd23ad1f9fa6b6d9b3ba
SHA2566fa6787f4ecae044220c12d7ea51ee4f796ba468dcc7bb7cf5a631a93a514e5d
SHA512b7ec1c7b0de533b6814929f744a9ebb2509fc524f1b98ec62fdde013885b68fff77c34bb5e087624debfb405bfd60b611a856fc4cecb09437377e3e4191fa7d3
-
Filesize
9KB
MD5b767a95356b5aa207cb350b2cb8fa6e7
SHA1f97f8fc6c2b20790026c70a1ea8b2138ac7d91af
SHA2560056cfca362a8b8a8674a3f94e3c3abbc0c421447fdd7ef860e6a9838035ccb8
SHA512fbd7e841181371abe4ec583699fa298191a3c0106ad973b200df0fc0e61456bd7b343cc716cb88f796f3e85674e1e585408f6f0f37ca21029af8e1c8e6ec912d
-
Filesize
9KB
MD59a108aed8dac42e43285b78f975768c0
SHA1fb7dea96b219449306c4b8c209f4e5d7574c1deb
SHA25612521f1a1027c6ee158b1f7d49d1a7035176eeb7196819d60f34487b81963b01
SHA512323c52dcbe422c8ef7dedf0ab139904ea3e0fbbcd88d24cdf256a61ffef6a529b47cdae78d4ff745681f6520900b897a44207a85c2aab7ef9e15a7e02488cb2d
-
Filesize
9KB
MD5aeba9111d51c54dfff93b900b6cb6481
SHA146469d658f79c42aeb066c981b65ad63dfdc28ff
SHA256290d4e60ef16e5a43395143f6011f104c6c99b1f931875317358e8b7083b26fe
SHA5129b295e114935f74df14f181a5546db89dd569ef9b91f5567b3ae2e6a838395523cee257e6eab6e92c33313279305175463546dfc1b8d0772112322ac1a21edcd
-
Filesize
9KB
MD56bc78b37ecd29795bd75913acf0fa9c1
SHA101ffb6bf4a29e887b602a8ed9802d8f382179df6
SHA2568843bfc4b256efc754de0587e59899ea14dcc8e0ea281b4525bc3ccfc9fcb648
SHA512a4c18a1675edad04e6fc20390501ab1fa97a1a5005b21019ea9809e782dd6cbd4f069023fa302a660988af04a28d4f2f7c49b91f0c663c1527e61ff68a31ac5e
-
Filesize
9KB
MD5326bbee813909ceb9a0178891aea130f
SHA11228dd37f18bb186e42551fbba9c31080ad1c3fb
SHA25650cad629fbb9ff052ee64069cab14fe246067302d2f31a1d640a45e4d32b0574
SHA512c388a4d66341276afc3c64f8160d790f7fa7ac944538643098e3b553ac56fa8c34ac584930a1a73145db70bfb592ffb633bd63345a2ad026838ee4d1bdc6f80e
-
Filesize
9KB
MD5d8e96c91784b6e9297ed8c9538237548
SHA1960ff0295bface8818238718d3b45e34eefaaab1
SHA2560f4a309b102b5a500c5445adda9fdeb3c05ffd4db9ad0ba88db8b0a3226a7cbc
SHA5129b546eba071ec6132f27eefb8366c79e8bed66ae0a0bea525d7c31cf270d17bbd3526f18fc8bb46e018d843ded52d566b40f220b00f6d8493b7b7e8f6d2fa703
-
Filesize
9KB
MD52b06987b324bef0f48a966af7cc7e6e7
SHA15083d402b97bceb41c219b28ed6bd7ec3bfa0f22
SHA256a53042ed8dfac8b9183e3e1159e36fc63a1e83d4f851ec229df23a01c86f73f8
SHA512c1e2246de3dd4770e69f25c0958fca7171472b23f8be5d1807fcdc62501d935f400385f7e3042002d97a172d2e2ad5c0bbf3c02934c935c68de74c191517a08d
-
Filesize
9KB
MD5333de9f7e4bcda25aa47c36c0d6047c9
SHA135da659f141c62719451bd5433c8da64e8ebc5f2
SHA25620b59abecf52d3debc9ad38d651a29d607199a71cb54b4e21a467607130d6c6b
SHA5129d42ad0f7726ea2dbb6723d53110e8542f90ec40235458c49a55dcf1eaefbe16b695d10baf1a0c7a654231775cefdc7d6779c14b888d2ec34192b813b875c113
-
Filesize
10KB
MD5d4f25ae31bfcf86b19ae27cc517afc48
SHA18285d561de4f2a3a7c5d7fb0b8b42d9e073140e0
SHA256bdc8420d9dc5899d786370cf7269aaa92b8a957e0c339991db28e801dd7b781b
SHA512554bb65ecd90613eb255a82502f20723f228145a39a43d38a9e39f3432f43c900c14f1a27a73e086a74b863f319819ee3a1e4ac0bb9b9bde0592818d35707e0f
-
Filesize
9KB
MD581720ab9d6cc10024e9eafe211b67c18
SHA19b86edba13d0eab43cfcb62c20cd21616cdb169a
SHA2564f5cd04600ac85b4020d5ed294bdfe3525914eb1195aa2e6469e133fc1e745e1
SHA512580a773c860e94c35d061dae4fcca84fe973e82d21a61aa7717cf89ab5e19d248a567f5a8a1348c137c0c30e974ca29b4fb66a7c43c9474a9f87bec575d64f38
-
Filesize
100KB
MD59c17d82f3c3d6a508f36745db502c011
SHA1ec247e860a1cd9080ff0cee3f2d5657b29e3377d
SHA256df96887a3d2c6114fd7013a1f1b51eb73e17cc92a90ed3fa637c0a6bdbcb7ee7
SHA5120bd36d7af917d28889abcf6662a5b615cf2a4c49d90bb8370bd9cbef5ed6a4dc7c85756ce674ac5a6ca1a466f29cea169a00a7c20061fba662f6a159f48eb370
-
Filesize
100KB
MD506f300cadd20790e30f8f8ebca7b66b3
SHA1a822605f8f443503b5caa1c98b89073e1dda5a53
SHA2562262714a68b6b72ce76ce051dfd9727c311f3b175de7402883838c85315de79f
SHA512abd2c1f75a4d1b1cc373ff0dd0d88df484a0032a6d585ea89f273dcd7580b86d43dece0dcc91fa5c8d7694829941dfa5aaaf3a45525ddbeb225cd523467e2d5c
-
Filesize
100KB
MD5eb3bbadc0961c3c817f622cc6e084906
SHA1efef1e5f4fc673ff01a544776b2d2be7e8587066
SHA256867e91155377b2f16e746eee5b32f9de86c8d017591fcf5cdb2d827241126ae6
SHA5125a1ae20d01e68327b7837bcab63c3dca8f8b32f0b5604ca7c65091fad00fb1dba4d070c0976c01c76bfb9de7622f4e1b7dcecc1f3f2851b0c4ad1d7674232b76
-
Filesize
100KB
MD56899801654b87785558d886db927ab70
SHA1294c9a1853fb0f8a5c313d36a0dc1d8d4b066b1c
SHA2564cf7f5d6c855c7cc4af441960a1ffd467578414e547c055388edc439d5a3aada
SHA5123af6ef106456eacc1e16bb1f4a861150f20977c4ad30b7cd78a1c990ca9b13d88abd20e67baf5093161caae7e0d3e74b446b0cf654105642534a390b078d170d
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
82B
MD53982423fac5dcb3653381bef0a464f2a
SHA1ec42b0676bcf0e0f7ab72253c5a6677b854ba195
SHA2568696bc32f354a66f210dcf61e5d1c640e57fb96c92cd9f6a0c343f72a32078de
SHA5121f967977673dd8b6962980b652a72346432f8308e00b12f4ff74cb669e93d2f5c8ac5db0932eb20426970b0d1cc15bbf9a1acfcca91593cf4b70d94184d3de3d