Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
227s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 06:23
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
ParallaxRat payload 51 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/4936-801-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-802-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-816-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-815-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-814-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-813-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-812-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-811-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-810-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-809-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-808-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-807-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-804-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-805-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-817-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-803-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4936-806-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-853-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-864-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-868-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-867-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-865-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-863-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-862-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-861-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-860-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-859-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-858-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-857-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-855-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-854-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-866-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/4388-856-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-883-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-884-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-897-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-896-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-894-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-893-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-892-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-891-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-890-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-889-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-888-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-887-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-886-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-885-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-895-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/2960-898-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/3208-914-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral1/memory/3208-913-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 4348 IMG_1086.scr 3220 IMG_1086.scr 4828 IMG_1086.scr 5048 IMG_1086.scr 2220 IMG_1086.scr 4768 IMG_1086.scr -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_1086.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_1086.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_1086.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_1086.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_1086.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_1086.scr -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies Control Panel 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\ScreenSaveActive = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Users\\Admin\\DOWNLO~1\\IMG_1086.scr" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\ScreenSaveActive = "1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\ScreenSaveTimeOut = "900" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Users\\Admin\\DOWNLO~1\\IMG_1086.scr" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675718021537791" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e8005398e082303024b98265d99428e115f260001002600efbe1100000007393172d7e4da01948137855be9da01404388af5be9da0114000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f80cb859f6720028040b29b5540cc05aab60000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:FMTID = "{30C8EEF4-A832-41E2-AB32-E3C3CA28FD29}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Rev = "0" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616209" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupView = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Downloads" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "3" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\LogicalViewMode = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Explorer.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3420 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 4348 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr 3220 IMG_1086.scr -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3420 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3420 Explorer.EXE 3420 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2300 3488 chrome.exe 84 PID 3488 wrote to memory of 2300 3488 chrome.exe 84 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 3800 3488 chrome.exe 85 PID 3488 wrote to memory of 4656 3488 chrome.exe 86 PID 3488 wrote to memory of 4656 3488 chrome.exe 86 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87 PID 3488 wrote to memory of 4168 3488 chrome.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn-staging.livechat-files.com/api/file/lc/att/1520/21450473cf0260d607c47cddf387d4b4/IMG_1086.scr2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd8606cc40,0x7ffd8606cc4c,0x7ffd8606cc583⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1924 /prefetch:23⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1812,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2168 /prefetch:33⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2272 /prefetch:83⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3136 /prefetch:13⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4920,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4928 /prefetch:83⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5180,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4856 /prefetch:83⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5088,i,113807319202549005,9275793892054638021,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4564 /prefetch:83⤵
- Drops file in System32 directory
PID:4884
-
-
-
C:\Users\Admin\Downloads\IMG_1086.scr"C:\Users\Admin\Downloads\IMG_1086.scr" /S2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4348 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\Downloads\IMG_1086.scr" /S3⤵PID:4908
-
-
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\Downloads\IMG_1086.scr" /S3⤵PID:4936
-
-
-
C:\Windows\system32\rundll32.exe"rundll32.exe" desk.cpl,InstallScreenSaver C:\Users\Admin\Downloads\IMG_1086.scr2⤵
- Modifies Control Panel
PID:2672 -
C:\Users\Admin\Downloads\IMG_1086.scrC:\Users\Admin\Downloads\IMG_1086.scr /p 1973443⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3220 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exeC:\Users\Admin\Downloads\IMG_1086.scr /p 1973444⤵PID:4340
-
-
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exeC:\Users\Admin\Downloads\IMG_1086.scr /p 1973444⤵PID:5100
-
-
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exeC:\Users\Admin\Downloads\IMG_1086.scr /p 1973444⤵PID:4388
-
-
-
C:\Users\Admin\Downloads\IMG_1086.scrC:\Users\Admin\Downloads\IMG_1086.scr /s3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exeC:\Users\Admin\Downloads\IMG_1086.scr /s4⤵PID:2960
-
-
-
-
C:\Users\Admin\Downloads\IMG_1086.scr"C:\Users\Admin\Downloads\IMG_1086.scr" /S2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\Downloads\IMG_1086.scr" /S3⤵PID:3208
-
-
-
C:\Windows\system32\rundll32.exe"rundll32.exe" desk.cpl,InstallScreenSaver C:\Users\Admin\Downloads\IMG_1086.scr2⤵
- Modifies Control Panel
PID:4620 -
C:\Users\Admin\Downloads\IMG_1086.scrC:\Users\Admin\Downloads\IMG_1086.scr /p 4588543⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Users\Admin\Downloads\IMG_1086.scrC:\Users\Admin\Downloads\IMG_1086.scr /c:3935463⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4768
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2184
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5209eb3248866bac5eda48e9ec4370368
SHA1ef9c95e56ffd3ed51a5e7141f77d74d3d1066368
SHA256eee3e832bc79bb394495b946062acffbb96a156c7fc78c1c77d471ec7cdad162
SHA5125993592981827f7298853e6c08f20451c48cdc26e59ecd266d5924d427c127f6518239e7456018e7509ceab0f54b01b3720bad9c99e0a5a5b40c1c7e391e0e4e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5a20e0f81a2ec9c7190644db1b4b3c22b
SHA17c7da99e22b08600c95a94b6d01ece0b34f6ba10
SHA256dde5dfb6020c9d8251dfd9bd53c9f166bd837f926755faba92a04c8e33827632
SHA512805fb34afbf8e3e7688e235869010dde18295178781959866585e29905d83e38533e7905aa49d21dd4ca1474207fa61078d69e38d826d46c993d0d4fecb02ca9
-
Filesize
8KB
MD5f6a74b837d05c364c77f20fe9a67f618
SHA1ca2c11e732554d2ef031cee3b6dd42b49456ebc8
SHA256ef13503e43eba6366d061bf380b004576291fe1788d2f942195c6ee9a21c4dd9
SHA512cf6679a1b29409e5aa0af2b1f0dde9f1d43cfb4276837d2aad9ebea6171569c2fb6aecc86add1c81993f32ec7c721f0ff1e4a9d7c21be6e1ea4b166f1359953d
-
Filesize
8KB
MD5c09e83b67679d79c673cfb9bc60e780e
SHA1e13118523386b8e7652121f840c2f94279e8f19a
SHA25680919ae526ffaa56f0284d47d6831f6690558b4a2c46b42256c2e1c05b86c46a
SHA5127104607ade5499495802e4bcede7f3ceac73fc70dc5c29f606afe20e96cab5c1f73df88f464362c7c87f57641b070f23cc7519901370690db6b19f936b6be5f4
-
Filesize
8KB
MD5876901661d619188afc19009ed3206ba
SHA1cda8a14989cd81e7c852e1dcd1acbce000ac2400
SHA25682861693ae2378f9548498923951af067d925f076902236f03d50ac19bca5c76
SHA512d45c28b70c43cbf5f1e26ed725963dd041b67a804ecdc624e68d3282c13cbcfdd66e665e8d3b289ab69729afa9ba41da3fb63d9a226bbdeb4c824f883ee5ab16
-
Filesize
8KB
MD52bff52ee9ebdc91fa909618d8b57d37e
SHA144bc0f1e68b50260e8a4f485ac9e1512a1c2060c
SHA256c68d9f0f213a0284ce7bed5af16999b5e6673742c2b18a989a27c1bf041f4b20
SHA5120a7b9b6d253ef213aa6bef436ab9cb639281616fd79f339893df6fd089d773919a7a133cc9a307f171af7cfe95fdf1bf023f7600274dc311970fc50e30d18117
-
Filesize
8KB
MD5da6c5a873161f81d0cb619967cca3c6c
SHA1948fdbb1ce68dca852887499855084808dc713b5
SHA25630e48fa02a89fb3e7151c2125f2a57a512d5d9350e32f153ac69f76a669a3652
SHA5123c694d79761eb61913b891fca6fbc619de10f66c86945d9a320a2d7b771699a7509f0d224efaba44503a0f012cfe91519fd5ee8a4a9dcb82f7c8647def8377c0
-
Filesize
8KB
MD54446fe6c8bd44d62017847fb179ae0cf
SHA1dc3fa7e752e922d7846f7f56b9ee5b7537ef25b8
SHA25631cf7e156efdaa6309f6927068332f5f41ec1edf2775c1dea20283a2344d81ae
SHA51224919084f0a506530c665ae1a334825157679241e7db4c3c9f83ea04327d340e984de8bf506e63ac6551c1941615e9cd7535fc20e6ccf6145ec3d8e9d78ededb
-
Filesize
8KB
MD51bb2c600b45838b64a28e0fe355d712a
SHA1e2f84b1c54666f5279aeafd70516ce6b01f393d5
SHA2564f1c7ac039758ade076677579033055524615d435163aff9b3118a3572766142
SHA5120e6687e666933ad22cdfeeaea39d6eeda9902adbbd412558278290efd5e14f06b10854c8e8292c411f28b25fae7c7512bfc0d6a56936cdf17a61900de01c030c
-
Filesize
8KB
MD5feffcf67da23b85ae8fc35e0199f7fa5
SHA12f0a8989dc10219e2585ba63a087b60028edea31
SHA256527f35d0f32ede4a1763bdd7e7a3df9beac83d93f395e600173e3e7b99daa260
SHA5128ba2bbd46bdd234a5f195c329eb0fdbdea439b7ee3d4cc5e499d1239675fff08cce1c66795569991a28e2836d7b70f1147ac7304ded900b57ddbf5fa902456e8
-
Filesize
8KB
MD5c45d7672a164e10c8e1af61782e0b2ae
SHA161d36402a0c27eedeb1ffb2894bf82afa222a7ae
SHA25614b0459246ca189f420f67d24e2a380b97d3c8238742c14142a60d531ed7ea5f
SHA51231b2f109f5b9fc091a8518d2f26b66cfbb76fee12fa626921bc6d4514d8d6576bb0af65cc3383ecc5e44edee816d8a9f95f7a4437b16ec782edf35b387002f02
-
Filesize
8KB
MD5c58ffaf331eb5b0252742ae9cdb5ba59
SHA18b5d0b3db1eaace07c13b8d01e13b6701108e424
SHA256f6b9220d6ea9c9667410fa56cdf8e2f3228c95ca287c5db63ad59ce089135821
SHA5121800e2b9d093d670250264a2fa410966c3efcfd143a1c7486ca7a0bdf4c06c9406e62a76717b18fb1afd694ace7a154ad8829455445599734db2fe4ea04a5ae7
-
Filesize
264KB
MD5fae269d6ed98f5a5067d2e83c929ffd5
SHA13fa84d0ed3b24e47d7b69c073e8e7b2de9ee3184
SHA256d251bfa513e9bdf66935cfcced6de95d5866fc1693eaffef0d589efc0d25a9d2
SHA51233ebf8c4fadd5948ac92ed6334023ba50152da9caacd3743620b6b18bb27af0e3de5640a116baf5a373410660128748f218a8bbfd2f96bdfc9a09f3c189be002
-
Filesize
100KB
MD5eb475dcbae11202d623963c0ce33279b
SHA1a26854e85b960a5b799b8b477a391a440e11de7b
SHA256199f5af20c2e594c2cb09a624ef7c46e0bbd07b0c311f01d2258696d0558f0da
SHA51227278c296273ca385b0bf50e009a27299035e5f2bacfa2185e3886a3e6ee8d1554b0e085b8b236139070f6babe24921009ff61f4e1be563aa17d0cc84202eb68
-
Filesize
100KB
MD5a88530a7593df6faad8e9534cff1eaa3
SHA1c2a97b90f9c5debd5193c43c171e0132bc98f25e
SHA2566ed30079d2e681e073a780900d63bde41c3e3ec2a8ddbc7243e4947d35c23197
SHA51289ec325b30ca2b0eaada3cea4b5f622c503e1ebec1ba29d7fa307200857cdca5ebdf77d62c3442d8a41fe541b22d1a04f35e51ee015e5d99b05fcd040c505998
-
Filesize
100KB
MD5545b085770c31ed0d13a7699e5f378a9
SHA14f1a936bbc2130598585d62546bb16eb4e7d989d
SHA256ee6b5be560b0bc414119dd7483d08b44397bcf2f0dcc4e5be5b13f517ce9c974
SHA512ad8a7a99aab31b4e46ab2f380701ee234d98d1cb56a240cb65e36f2ebee4376f21781b4355f93052982e083436084e3cfd047d853c5fc2de0bdf08f6cb9a0550
-
Filesize
1KB
MD51348e4e8fc451e8021f935f4b1376c95
SHA1c6fecb47e09a1a255cbe9a9f03d91d2100cd1737
SHA256cdf0440a375c4d4a180a358ea3c87448482622fbc71833bc797ec1410e54bb01
SHA512ef23469825048d1fdc7f693a9efce5a1bdb8472743917288fa06244c7172d933347d8403440598a9f4062b3514ee313462655e21bc1c1a8dde78cfb607796703
-
Filesize
1KB
MD5a2d5c41311177bf18a795638cc4e2777
SHA140625aa169f3bceb6b96060b8a0634bf8cf5eac1
SHA25663b9d5b599c016878ea7fa9de88fd0a6e89b09210475f4869b0d8e5a71946c23
SHA512e5c5cacd31a05a67449ea44fd403f4585960ff3a45104bc1044d2cac2acdc1a3e309241092a327df4f186367cde75355c7622d213925efbbd813cdb22fdc7ec0
-
Filesize
1KB
MD5ad3fccf15709cf647bf96fac34496b31
SHA16a6de954c54bd23c89dd74af31e6b61d8b1d0646
SHA256ecfd2cd5c912cc216758c94a380dfd15a07f7fc36c1014f77a1d08944d50b532
SHA51294308f637e71fb9a5b6d66eeaaffe87bc011a1810f8a8877145fa2818db2f7c02d8c2715064e8f94bfe78984930b611537638ac3b283b9111431f40cfa49fa53
-
Filesize
1KB
MD505f6f9b3a33cdc2873de2388df2f026f
SHA115805569331f272e574f8a6bdb72b10d08c1a786
SHA256b803f457902bca0381f33c815c8cc579b479f48ef28a32359ebcaaa8ddd6822e
SHA512b5aa24b0f612199c57a273506f01fae7494fa473cc2384e4d26f843c320dff4d40fe1240d7bae8a2426f7e80b7d55df7b8dbeb412253203e440f9e3e30742a76
-
Filesize
1KB
MD52abb9a0e3324e080e8ee304e396762b7
SHA1de6de21153249c696afe180c6370d49bcc9e5e61
SHA256557c07c79dacc7729cf91d83251cf14446ebbe149b1b0fc1ef3ce756277df696
SHA512bfc5eb79cd0a254ebefb0ec937bc6953bc8454605e0b0ac57d3b3ae7894e108ad498c6e3b102e2c68883e82cca78c01aa1606c1e723b9fc38e9b25eb3cf1b194
-
Filesize
2.6MB
MD504c219134cffc77c39841c30704b2f6b
SHA11ac5a5b9a18575b0449745dd2d069f7a8b561d46
SHA2566c59c6cfadff62b8d3b301d97e91b6a65b3da0415641fbabf95e3404c8e4fcbd
SHA51258854e09a781150255d662a2a7968159b81a516dc05aa99a787da387b2baaba2c18e7187274e48b8cddb58aa920d7cdc4bdcab98a955f0a3bfd56fbc980b8361