Analysis
-
max time kernel
58s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 11:57
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:9001
91.92.254.89:4449
91.92.254.89:9001
fefewfewfewf
-
delay
1
-
install
true
-
install_file
Realltek Audio Service 86x.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000234ba-179.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 2FA-Cracker.exe -
Executes dropped EXE 2 IoCs
pid Process 404 2FA-Cracker.exe 3480 Realltek Audio Service 86x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4480 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677646734124325" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 404 2FA-Cracker.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 3480 Realltek Audio Service 86x.exe 3480 Realltek Audio Service 86x.exe 3480 Realltek Audio Service 86x.exe 3480 Realltek Audio Service 86x.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 3480 Realltek Audio Service 86x.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: 33 4728 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4728 AUDIODG.EXE Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeDebugPrivilege 404 2FA-Cracker.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeDebugPrivilege 4116 taskmgr.exe Token: SeSystemProfilePrivilege 4116 taskmgr.exe Token: SeCreateGlobalPrivilege 4116 taskmgr.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe 4116 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3480 Realltek Audio Service 86x.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3848 wrote to memory of 1540 3848 chrome.exe 84 PID 3848 wrote to memory of 1540 3848 chrome.exe 84 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 3724 3848 chrome.exe 86 PID 3848 wrote to memory of 4292 3848 chrome.exe 87 PID 3848 wrote to memory of 4292 3848 chrome.exe 87 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 PID 3848 wrote to memory of 4492 3848 chrome.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/Sfx0BTzb#s7jCybOC6dPKwUdHm3qyaSFckiBCMQuX_B6bVo-YcLU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe9555cc40,0x7ffe9555cc4c,0x7ffe9555cc582⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1672,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1656 /prefetch:22⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2064 /prefetch:32⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3652,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4652 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4972,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5220,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5236,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,8746197516067735616,7685259552430027332,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3620
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b4 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5112
-
C:\Users\Admin\Downloads\2FA-Cracker.exe"C:\Users\Admin\Downloads\2FA-Cracker.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Realltek Audio Service 86x" /tr '"C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"' & exit2⤵PID:1668
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Realltek Audio Service 86x" /tr '"C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEEF4.tmp.bat""2⤵PID:2868
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4480
-
-
C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD50e0061d23baa334f69598f8131166b24
SHA1566e83af6cb017ef72930e1b303808eade64718c
SHA256a74d1d494a6ee60024e808ba0a723a07f66f1c889797186c54faa8f75e31aaac
SHA51222585fbbb0b7512ec6a5b29fccc883befeea11c7bba78f8cc6b80607ac7c9f04a3a332df60b5df6e9d3fe7149320f69f76edb5f7a1d5e42c97844c3c120ec927
-
Filesize
120B
MD503842446d6c9cc788107a57bf2ffff32
SHA1990db2043b80492cf452a4cbd77e05ee48bac695
SHA256598602dafc6bf9a1327de509d0d19c1e5727b601e1e7507f85c401ea2020d9ae
SHA512744577eaa577f7b8761d12c0f371621b2c8a135fa1b6304c52776a6a28ff874f79a66d04cf6c75ba68bd8729ca435db3f40cd25399cd9f68bee16f59d657d74a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5bb203e72277eab6a4efa22a0c0fcc718
SHA1b3d65627d90aea3b7dcb02954e6c98f82a3e77d9
SHA2565cf430829fb34092bcef13ea35211cc05e79e6511454bdddefa3f1989055c0b0
SHA5124f848a7537f46af66f9f4a840984f99f7b515ebf6b1e09396d881da6eb10480ac95e5dfda3b68d32b061cab079ad03dc177a3ad0dbf68fdb3579d287b567cb67
-
Filesize
9KB
MD50ee2fb845e07fe9aa81af75a6a0cbc8e
SHA1baf96992edd6970e35d99cd52f10c5f96f194642
SHA2562302fbbf097183448fddb649c5c2a6510ea5987ff4b92d76469de18f4f137c1b
SHA512d77f35c28e26bbe4db8ad3779e215cd3cc513450e3d59702a599edfb597c221def33d7368fecf4fbd83cb5f805a6ec75b20e0c068071f527e8dd8bfd5246e116
-
Filesize
9KB
MD5fca675c8f7d4153fad0a8e4f5a1166c9
SHA1a9e68b50c4a27b515bc323472844ddc5578ae4e6
SHA256fb992f00ffee2008f3e410095a519b405df8e15bdb416c2440a2c0bc682e279b
SHA51276f7e278fee5c6035eb7b582575897ae995628b7b7c57a08984b8f8074bfb6fc9ac8b071d2d9861c6e442b297d971c24ee2c18dc97c42318cb167d660d69513e
-
Filesize
9KB
MD5d9eb3a1f89b67dc2891324b6c56c4749
SHA19c2a1d07f1d0eb1ce05374b5d5472c3f368fc514
SHA2567df97f8afaed2cf3ad4e5dacfffdda65d35d32424b1894acf34e362fd0bded4d
SHA512f638b4e3ff7ec6da50fe41dbf4079198f68c6a5fe6dad2d76907eadb39f85f800cb8eb99b912f6ece400946734b10802a684464734f4399c6e270971ca57f685
-
Filesize
9KB
MD5f32f9d9222dd42de8e4bf90e64d9c616
SHA1e4a78bad7592175c524efc58e6f8edf2d1281374
SHA25676bbb16e3ea9540e5fdd229eabb2bc79f3732285a00cfea4adbea37880f0550c
SHA512b68ac701a2177a1ab93b5f4753ec2f2b6113ec9ac00810299a92389a2c3a07a0c3c3e24211bbdf6bd1f102f3219d458b21d8653bb4faab5b6846a93ea8ede0eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD50fb59c3a4fa1cc744f18cf18bead248f
SHA1c00056a1f161b312b9e0572f02cd1421844e3f9e
SHA2569c55aaa0c1a72c972700f26605acdee78087ceeab44e727911ed4b7b0368573d
SHA512ec8457a688c166b220963dba970b66f8e2944da68d46ba3983cd16d1b169ac16aa65c3d3ed941c97b8e3ca7491ad857f2a34af813c065b01a92758ef0d85608b
-
Filesize
99KB
MD53cf460d70fa7b8aff0772e140da48884
SHA191f59cfa43a82f3bfe0d5f0bfea09df3c086b20e
SHA2567d4d374bcf8ccc053ea7e19424637f13d307cd3e4e10143e0c790d4b229653f9
SHA512955e3db1d1de255180e2d69f0f922ccfac221db83ede30d3207dc7afbd8c896931f9a1fe8b69e94067e7b1c76b3605ea5a892c296e180cbba5eab2b74de214f5
-
Filesize
99KB
MD58fed6ee52b246299fed00fb9e004c69d
SHA1324da2a8a7b01d203a94aeceebd01c8f271a2922
SHA2564f6b5212c8dbcb7bd77ac83fb10770580ee89845d5e4fc0d0fd4531ace15066c
SHA51216ae8907316de43392af012a75a85e0061de997f3b908dd62f92ade7ad179b459ef293f3cfa7a49109a900a874c2dd74690c025621d18ad00ee37ed353deceda
-
Filesize
170B
MD5da761b5ffaaa5abc5c568cd12a7e4141
SHA1bec2ba3c2794d046bf8767bc351c527af26aa924
SHA2564c4bec71da779121d1ecd3387ebf6ddf49a61f36258ed54bb884acb267aa8ca9
SHA512ba005e85ffaaa2aabd62066f08f07396c90029f303fd035dd4c684382eaa3cef02e99070147c3c96c489431e893e794e69181324a810def4e0e5d81d9ff27804
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
82KB
MD5401cdb3441eaa85c7d5d85b8cfe0fe54
SHA16bbb659c5c2b30c24313efa7a3775b78cbf385c5
SHA256f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d
SHA512fb70afc7e5a382b3970cf92feaa12c4cfeba7a7dbca0d0f8736b5a38c0e4c42204cf4975081eab940524332fd3067bc4d5da053b55e71f983e01bc20454822bf