Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
3Release/Be...er.dll
windows10-2004-x64
1Release/CeleryApp.exe
windows10-2004-x64
1Release/CeleryIn.dll
windows10-2004-x64
1Release/Ce...ct.exe
windows10-2004-x64
1Release/Costura.dll
windows10-2004-x64
1Release/Dragablz.dll
windows10-2004-x64
1Release/Ma...rs.dll
windows10-2004-x64
1Release/Ma...ns.dll
windows10-2004-x64
1Release/Mi...re.dll
windows10-2004-x64
1Release/Mi...ms.dll
windows10-2004-x64
1Release/Mi...pf.dll
windows10-2004-x64
1Release/Mi...rs.dll
windows10-2004-x64
1Release/Sy...ce.dll
windows10-2004-x64
1Release/bi...x.html
windows10-2004-x64
5Release/bi...ain.js
windows10-2004-x64
3Release/bi...tes.js
windows10-2004-x64
3Release/bi...ase.js
windows10-2004-x64
3Release/bi...ses.js
windows10-2004-x64
3Release/bi...del.js
windows10-2004-x64
3Release/bi...num.js
windows10-2004-x64
3Release/bi...tem.js
windows10-2004-x64
3Release/bi...ums.js
windows10-2004-x64
3Release/bi...nce.js
windows10-2004-x64
3Release/bi...del.js
windows10-2004-x64
3Release/bi...nal.js
windows10-2004-x64
3Release/bi...der.js
windows10-2004-x64
3Release/bi...ace.js
windows10-2004-x64
3Release/bi...rnl.js
windows10-2004-x64
3Release/bi...ons.js
windows10-2004-x64
3Release/bi...als.js
windows10-2004-x64
3Release/bi...rds.js
windows10-2004-x64
3Release/bi...ing.js
windows10-2004-x64
3Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
Release/BetterFolderBrowser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Release/CeleryApp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Release/CeleryIn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Release/CeleryInject.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Release/Costura.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Release/Dragablz.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Release/MaterialDesignColors.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Release/MaterialDesignExtensions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Release/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Release/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Release/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Release/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Release/System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Release/bin/Monaco/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Release/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/base.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/DataModel.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/Enum.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/EnumItem.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/Enums.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/Instance.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/Model.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/RBXScriptSignal.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/ServiceProvider.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/classes/Workspace.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/functions-krnl.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/functions.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/globals.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/keywords.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
Release/bin/Monaco/vs/basic-languages/lua/autocompletes/libraries/Drawing.js
Resource
win10v2004-20240802-en
General
-
Target
Release/bin/Monaco/index.html
-
Size
13KB
-
MD5
8132342ce4b039603cbb3b1a32ab859b
-
SHA1
66c46050a6e5b08758c00455ae26a6c66e94ce4c
-
SHA256
3818906ed429acd27aabad7ec8771893d60658ea31b8d0c92418b96de8ee94e6
-
SHA512
44d93118187e703af1fc1627de7e97c39072e666c9086b1b4c00a7eadce1913c84dc97e8f80e2b514154ef66b23baddbfd71a2faa250735ddf4d2bc12709cef4
-
SSDEEP
192:oL3bXRggAbYm/9mv2Oxr09VpDwFgBsK7u24FzTkcmc/VT+9taAc4dReigXN:2RggAbYmbD9V9wFgBs+SFN
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675367594383483" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4716 1088 chrome.exe 84 PID 1088 wrote to memory of 4716 1088 chrome.exe 84 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 1448 1088 chrome.exe 86 PID 1088 wrote to memory of 2080 1088 chrome.exe 87 PID 1088 wrote to memory of 2080 1088 chrome.exe 87 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88 PID 1088 wrote to memory of 212 1088 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Release\bin\Monaco\index.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8be25cc40,0x7ff8be25cc4c,0x7ff8be25cc582⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2032 /prefetch:32⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2276 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4592,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4840,i,6921294656206938874,10407908913835458724,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4864 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD59ea81721639deb97730f6bfe42abea86
SHA1a7a05096766f1978a0acb5f64a498c6eaf56d7f3
SHA25698ac557668148896cf1001f07da3811df0010d36a26797a8dd2f480dad30f57d
SHA512bff2b4ee55fa0ac0d56baaf1dd97801a698147d5561d97ab3f2791d93e9d815fb222a2b7e7bcfa16eb5144effc63412d5c673a30fdfcd746d357629992850166
-
Filesize
8KB
MD53a5eb098810e8eca0c2a82e4cd7bad26
SHA1f9609ec606f9f42b4025dde3d7f5cf3080bece3f
SHA256a98e695612ec41ace6b4a350bf9a1d0be0e113fd38fbd04884b0494fbcb5f898
SHA512fd52b0693dadd9fbb9c50ec1d4fd8c64b782c4fac2c641296f013d915f876b849be76b94bbbdfcafedc25546e9babe0395779b22c4bf7c137d2e24a371266645
-
Filesize
8KB
MD56a63ba8d342a37c4a8568eded563383e
SHA1125519366a1f1952c54e38e50067793145c28dd3
SHA256c106db2ea2d8ccdec0f3f7a9566030eceb9b02c5f6e137cc43b40ecbac8a1012
SHA51286fada17a3f2827d792f3193ec30ef154be1d16d1cf1d0269ce8c133e19e79d4837d465015d4864e86f182b6efac6929ba2335398eeb6260fc814ae868487e6a
-
Filesize
8KB
MD570a9f409a6d76f46977ffb12a68e71ca
SHA1cc37ccc16e1d43d3a64ad71d7e3a705bc9ef1952
SHA2560338010a3baacc135169789d8312561b588f2c550a530d3661591616b17b5f40
SHA5128effcf05f5e3a23fa14e0d0c26a8e887c0dda3480ecacf14c8e09d895b6b63115527e9844c261b970491268da14403ba50d424d235ba422e42d894b48d4a343e
-
Filesize
8KB
MD591ca9b553273fc82d51d554aafe7fcc8
SHA15356f31e97d87ef271ae0791ef8c676df3d19b17
SHA256761943e3a50f7f453401fde1ab6c04c9ce55fc39dd3cfca5bafe65427d220b4b
SHA5124f87576dc97eeb56b9130d0949b2b22ef285d4003b57c697770abee3d5b5adbb47530cfde2d6058969244e49d51bf14f45e7b32dbcceae0ce83f716b743fd443
-
Filesize
8KB
MD5499c5218dc0595adac6f0480bccf4f63
SHA112018b2562aaa8af934a8737ac5adeec05ccc796
SHA2560b512d430b60f9d0e273638ba2579832c291b43ad1a40b3170f03edcbebdc9e8
SHA512d5d24d7563776bf2ee1859b5c41d58e0f158afe0fb177e3ea8a3f18b5094e64346a84404623674f9f3b9c8badfa013a40416354b18ada7d041c34f50ad6655c4
-
Filesize
8KB
MD5c3a88e7d176bfa53073b676f1e3159e0
SHA156815962db6b2cce8e752e1a3812b35fad349790
SHA2567d0665e62e507409513a9c4ae6ebf7731361e2ea37b0b48c66e8255c956cf240
SHA512b1704d7be0fff5fe18effdd460f77bde409307b1e682a76ee8f111d5dc1b1b202c4cdce1f9bcdf44ab722ab1e608a9363506d53e8f01bc7e037da7b90bc06a83
-
Filesize
8KB
MD5c03b124e2fb2b2e3588ecfa87cba119b
SHA11b7ece54cdd044152cc31632eed053542b1d9c4b
SHA2560769067e57d914e5351a8330e0f873f907110f156a5102e6f99067176c8606e6
SHA512a44c8fae4c174bb836b6490e580530f432d994f223417785a8f415a51ace6d4e1b14e35191f0becc2e403daf4d5b48dcdf744dde601f3c246536030269b93dcf
-
Filesize
8KB
MD541be76d5f0302f0212e8d97572193a4b
SHA1c9c3cba12dfce0b0b002a0d321bab3d39217f552
SHA25642d90865533f9142ffb75885d495b0f51686d9b1742a79399494aa0197385dbe
SHA512203534bae84f228f4ee1101123860d4ad6dcb5f21ab83b73c504a5c1a0783a2fd4df2c0f8b017b945fefd8508b9ed7883b5d3b64e9673d17aaa61ca6aaf39b62
-
Filesize
8KB
MD55ee05e99c7597a6cf1bf9eba241a4ac6
SHA16da1d1a97f4c09e02e1f900586d208613e8f7b58
SHA25667c8dd9a2fafeb8eeafbd13360cb1ba189afc4eccd8a89e20c03b27af79a3729
SHA5126a3e4c574c3907515cadb8c9311617e9a229e4da639945cbdf40923b53dc832f21b9a3c3ca36d420ebbb75832a14f241fada9f4f6778caee7536dd737262a343
-
Filesize
8KB
MD595d007b8e8d14f7e204b17758864ede5
SHA1ccd6fcaa3bb24e0d83ed8e765fe57550382df217
SHA25656277dd750384983ab822d266462d70ed33afea5049d44f93e5c1c01ec1565f1
SHA512872f3fc1cf0dacea17d30d5be5ba32299c9a9ae3d77d24e699dc56004644e5a4e4b91d628eee609b4ca84748deb570df7fddfb69e3f137c82ec8c40b6ea184cc
-
Filesize
8KB
MD55408ae5960db520fbb2196d34bc36713
SHA1a88abb973d554a2724d338cc4806df68cf8bea7b
SHA25686522ca2c153b736871acd52ea5420d1906dc95ad6a5ad0d6401accd7447e800
SHA512581862ecf50b213786ba32326cd8551533b4d970fb5f033b74c23ad7113c4bc783697df51ef3947b0e6476c2b8b37e49b68943f971f94078af60294cf279175d
-
Filesize
99KB
MD583725af7b13a82216ee45c47c749dfcc
SHA1ed496f156e27f646a06db6974f78a6f6c0670487
SHA25642fc59d5aa934f9b2a6dc5f401b835ba384ad8fb3d385476e9c16184da24a0b0
SHA51200154bbf1134c31280ede3853b4e5a1a22ad245692dd05de53dc944c55f6b3dedcf02a515b870afe2c0e7be3beea69b170b76ebfbfeba4a674f7bfc6940c1266
-
Filesize
99KB
MD544e7ff90fb71bdfcd96a0d6deeef342f
SHA10d04d0f05103171d2adc796b2573526206f04259
SHA2560d5aeac31e469148a34c1d6bd58e6c1dda2ff917673ab5a8a54a9b6c51007aee
SHA512bb87f7f82599dd22e823b9d8f05a4bc9bffb244835a13620d55c0f709feac1375115cefca128b8cecfed74a180427511c061b30479f45779bbae8b433d11dffc