Overview
overview
5Static
static
1IM NEVER LEAVING!.zip
windows11-21h2-x64
1IM NEVER L..._store
windows11-21h2-x64
3IM NEVER L...OS.txt
windows11-21h2-x64
3IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5__MACOSX/I..._store
windows11-21h2-x64
3__MACOSX/I...OS.txt
windows11-21h2-x64
3__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...1.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IM NEVER LEAVING!.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
IM NEVER LEAVING!/.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
IM NEVER LEAVING!/ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
IM NEVER LEAVING!/tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco7_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco9_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco5_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco7_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco9_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
IM NEVER LEAVING!/tumblr_ndbp92G3n31qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
__MACOSX/IM NEVER LEAVING!/._.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
__MACOSX/IM NEVER LEAVING!/._ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
General
-
Target
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
-
Size
232B
-
MD5
03cde05230b02a9e42b0dcc8975365ea
-
SHA1
f431281f74e2c43e95fd063f5b5786fd34328020
-
SHA256
1096e691e41db04137012ae3b450c77ffa894db6d7fcfd6ebb9ec49017d9aaa0
-
SHA512
6e224a6ca01554b1b439b746d11e235b7b9b61851677791c4b6588b1b4dd352e466a074aa3cf1ebe59af109a43ed713242da01729dfa76bd33f47362661e5b60
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133679435983096537" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 800 chrome.exe 800 chrome.exe 800 chrome.exe 800 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3680 4100 cmd.exe 82 PID 4100 wrote to memory of 3680 4100 cmd.exe 82 PID 3680 wrote to memory of 3844 3680 chrome.exe 86 PID 3680 wrote to memory of 3844 3680 chrome.exe 86 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4200 3680 chrome.exe 87 PID 3680 wrote to memory of 4372 3680 chrome.exe 88 PID 3680 wrote to memory of 4372 3680 chrome.exe 88 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89 PID 3680 wrote to memory of 732 3680 chrome.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco1_250.webp"1⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco1_250.webp2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa511fcc40,0x7ffa511fcc4c,0x7ffa511fcc583⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1832 /prefetch:23⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2120 /prefetch:33⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:83⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3124 /prefetch:13⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:13⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4572,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4608,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4616 /prefetch:83⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4692,i,14368842628000159604,6280213523901651671,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4780 /prefetch:83⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD503dbac62251fea12ffd4f9073c3efcae
SHA11ef5f9e4939aed21c11622238f7c37eee19c1ece
SHA2567acd8ddaf095707f52f1436a5ab07908fd03add70d2dc69706bf2efc8befd2c8
SHA512cf8d6d8aa1b16909afdf49d888175afcfd09cb69ef8fe3476139f54d601ee52a33303124db386c33176441aa96b2eeaa97e6b218d1c343deee705de845d2680f
-
Filesize
1KB
MD58830f35e69e65e1731e2fe77c6186c45
SHA111e21ddd43e9cea4dc3dfadadd98ff83ce3a7503
SHA2561da4a2433a48e3195b56e36c59883e2b0e0fb4d895457977e64ce5378d46e2b1
SHA512a570800e08debed0d6a4508d60a6b6567c55ccc5619e0788fa5fbbcb80b7bec865573e76a35b0bb06367d9b7f4e51045ba5280761518bedcf1da1a5d911a22aa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5a7c929b250bb525493c3278e3a95ff67
SHA1dd23e06e94551a165153790424fe52700ae4a776
SHA256b76c4dfe62706baecdae48455fa27424eb94900e6bea92d24e4ec547d96688f0
SHA512e97588f36f16097b9f59676dcad24f218493cc530df197df223ca2c7d7971dc5b72f385463e09e7c094a22d05a6134461243aa42618e83a821bf6c6f1aa09970
-
Filesize
9KB
MD568d00a3d89169db9240a3d27f2612d10
SHA1c85530a71a89f832229078eb2f5e58f585f89dfe
SHA2569b0fc024deb8a578f9b0ec9a91b772fec1ad52038bc5f31b37852ce80a1ebf56
SHA512b7232b4e714a2687d3eb5c94cf0277b74cbb0014d5563294f27360f2fcb661e7f405a793609f9752e57068fb6f3693c921050efb837e175de5b48f0e3452c801
-
Filesize
9KB
MD58222d3ff3316bf3db0a1f9faf37619a8
SHA10d976b5d53cc8a547c393c68b2581d2b09d22bcf
SHA2560efc935ad990f52e777453d457171f61d5c8887bcb5bbdc4839cd4de4ddb2634
SHA51267485ef3167a9fe192d05b6c9658ad5ac108e98f286ee4b27519ba81a30f02c75bd81d7f7ffb9864bd0c6a7d1c3daf0a9554aaea26980f06af6f95a8b5fb749e
-
Filesize
9KB
MD5a48d83ad746c0e95613739a66819ff19
SHA1dee4aaf357a653fb706d107691e65bf6c6c5a17e
SHA2560b9823f9261a09c8bc44e696576b1568d0b6a1f78772bc84040878aa35fe192f
SHA51256c90e028a9592e4e2e6fb993bbef9671f667901fd20de22a74e36201427983a3f6d6af1dbcf836c5123d9f81605567586cde82af70feb10d05a9de5716626f0
-
Filesize
9KB
MD5a387c25ad2b022840cff058691dc1e93
SHA1f953c9739684a557f05eddfd7e39cc67dd64f1e5
SHA256e66a26690d76684cc1ac3c3e29239b39bdb51bde81c9dcd00ce719395b11b7f7
SHA5122b56a840fcd19b33c5170d0bc8c0437499624455b0dee3d0ba4ac8259c79b05adb335d90cd71a969c7cd23065dedd323e4d88b1bdda1ad4fbfe8862fea501b56
-
Filesize
9KB
MD53a29261c596cbd1d8d9462161ff90d3e
SHA1b22ac0a9ec0e150bef15adc45c5ff0eb389933d0
SHA2569882ee564c86d784a0e20baa37f7bb2a5049ff777809fb7eae44c3bc735f0534
SHA512170e54dbef43ced5c61382bc9ef107bf66bba9b0b9858f4508dfc45482652d9178e0c4377473c68d195ad68176b6bc32bed2187add894e436957566811729958
-
Filesize
8KB
MD5c39591a4eb98748bc8a7ff51d3fad239
SHA124e9fed076d6cf1cdb9588e40878545ad13c1503
SHA25646a1b5e344c76b9d8464114b7f0d4f4253eec4ec8b00666d8cbdf7b8904fbbfb
SHA512db4fb6f6c21a91d6e6b323adc77028affaffa916aeedd54eeb172c9a49b74d1cd9dae5911dbc62c53d8784d481e84df85eb856be4e69c0399a2151b1aab2a5cb
-
Filesize
9KB
MD54cf2aad3808102ebba044af928b6e352
SHA1110f7d6bdbcd765ba0a13c593c6a937e9eed00ed
SHA25630df311eaeb14f76d22d4540e43bd0bb6d85270cb34445052a2a2c09cf42ea18
SHA512caea42e26fa2ac7e898552d5cde619ba09023673e47df9791b71ca647ae69221b19840828d7d0e7b4c06ca12ee0f3c88bbab841c80d9a35cda8a8376150e11c3
-
Filesize
9KB
MD5bc72ecd1b0d540fd1f7e2a6b92954480
SHA192664e1480a6833e8de1471e9f974334b1a4dd9f
SHA256bf4ac8301470c2d82fc7a30726acb6aab0e7c5bc84ea464175711032edec94d2
SHA5120f432bfb54e5de8d4d5525d1b721a9b68a9fbbe904a7ab4bb1525cb42ce443be8ef93b4b0de0dc0644d857e25b4e63354286d7268cace325aa65c8c720c9e6bb
-
Filesize
9KB
MD5502942acdf346a5ce1f01ae0e1b26ad2
SHA18f114fe8482013fcb4743c6c2262a3cabeeff65b
SHA256672574635821aae2e770602f9e73daae0f669480e08d077535ec53aff96fb672
SHA51224bdbe07ba68c1727e1eab316d52d837a25f3f3cf40cf0b761ceeabf51f7e0c3db0e388a5138a66b1c86521c673f4dbe33dcbaf26303b25a54888f0b973b46f7
-
Filesize
9KB
MD5c418d5b1d74e39cae27c4bfde4ae630a
SHA10a3012bd9a2ef7728965dae5652857ed284f806d
SHA2562007bbdde6305d58ee81fbbc8e5bd5615d36a8f723eb6eae3004b4983b9269b0
SHA512b6e090d8afaf6296575b202e9b48ce74d92d2a9eddb67bd0d8ad112d1848ca9f797d0232256be869ddf36cd0a611a687ebf85a8dbac6be92a879560e2b28f1d8
-
Filesize
9KB
MD5ec5fcc8fef4cf5d97e392883186424ba
SHA17e0ff6dfb7cc82cc0f68fa0b7941243333e8fc9c
SHA256c7556520ee91d11ad7468ad7736ad62c8acafe1a868915ae056a1f1b04c3a916
SHA512c4bd1cc5a38997b58a66c346198872abeb87e00127612702149cdb3d9b1bb5ae01230f2e50482e5ad4fec3407af5255a1ea11cd1a90d908b27cbb73f27627aad
-
Filesize
8KB
MD57903f34a22f2b287e089bd14a6073a16
SHA100a6ccd1898f01a22f7a75211e2882b09c6d8ab1
SHA2562d81e46f08908179d5e1c09a36e6a819237d9b79236acde0b99c2f3c993a7216
SHA512834de76a80a5867fa651472795462fcfbed29cb30d618d5f8e0f226bafe86851c208e6805c43b56bcff104ba9e8170270c90513ec82a49f8cf2a5fcc8ef9a2ea
-
Filesize
9KB
MD50eb6b7d33e441afd955a835f525138bf
SHA1c66b8934d78b09f752b1d6f37edf57dbe3c18596
SHA256c398792a380b836bb7feb3a0f90b20d69b748c1220dd2fd25bfb6ea21296520b
SHA51271af04b2a58ec0fc5d0869a4e3895f502260c4ffd83ff1aa6a87d4f16ed426d4664d9851a0d1402d8e8ab14598c242e413f5d64a11ba814f520e52bec8d98ef6
-
Filesize
9KB
MD5c4dc45ee16eb0599d83f92eb17994d7c
SHA134d8c7bc8246a74f7240c049789a88281a57fa06
SHA256dec4d23887d2eb6c7711a20d1f2b73e893dac000945941ab540deaa5974b4e97
SHA512546d6630f0cad5a58e56f63c19ebf3dba0aacd602617786a43da903e14f52a64ca6c62997cb804ccae6d103d33e935c3ec515a0ead6187cad13d2187853224f2
-
Filesize
9KB
MD57195d501d1608a51d0d8d9568a6676c1
SHA1f51fe87c8ce829458f26e6dab4bcd5c0ba333460
SHA25678c23befabb7dc28eb34f77ff1c264c0345c16c3a7f90632821a8f176710b022
SHA512cb50b2061558281032c3fcdc5ffa8d6d1c74d149a7afa16d50f35648b868f170da8f8535e3fab0798aa3957a90c66cd0377c3346772ed1bbd7616329a157066d
-
Filesize
9KB
MD5d8063e123a554b287bc57c2de9b7eb6a
SHA1d8c4e23d50636e0c2562fa1351bbd1fa7758ad0b
SHA256bede3bf93f8304b8dc8465c24820671afbe3e75c2e65348634ad64ff97c81b2f
SHA512fa2c22231f8b26e6bb4e868b18f135e298d1d358ba3512f8a0f037a916f67cd2c1e78fe4191b7f68c2b09d4454eb270a21077d6bc87e76aeeb41c2839eec3c22
-
Filesize
9KB
MD5b0aba5af1683ab51ff5f2e46f8adefa5
SHA13af442eb81042ab6cae75d1dda475d651e1796b4
SHA25676fce911f980038ce5de4d4614e072ac133b705408f1ee872e23f1f0e31ab217
SHA512af51c6c13f48b2fee4b4c405f0ce7a496040f25c0b0c64a720c884e724c198036dafa1d4178890f071b5ac79e0d8bfd53385950b76d64b78ef0974e93a3c416d
-
Filesize
9KB
MD57eed3a315f72433a015a51d726fe0221
SHA162bdf2c0df4a27f8e39c4c4ded8fc303b31ac816
SHA25613bd4bef1233391f0b5f2406320c90adfff9f2ad12e431bd61f8a2e6ccf26b15
SHA51211f7b68a8c39c48a3c7750d4a13d542ea902a1f0c6fab0ca25ce7f6ea293f4cb2eb40933b7a930fcf228115a30fbebfac983723123ae9f7e479ff9369e722dbe
-
Filesize
15KB
MD54a8365067b7521a94ea4d556f2f0ed39
SHA1ee61ea95a978cc8425df48fedff488800bac57fe
SHA256cfc07339afb6040d1cde53914ddfaf719055768822ce6843c50e041098cb73dc
SHA512b6b3b5c58e9a8e2105ac827b655a3cf30a9630268fc49b0d309050017ec1f895b921e1e79b0907531f92c916439f62508c9eb0e635bffd0b28dafe3a3ab92644
-
Filesize
193KB
MD5a15cc9535b488dd82a8d0e4e6344957a
SHA10b80120f157ed134e5878e7a605bd4b1bb3ded36
SHA256bdd1b1a290094befb0e247cfe55c7385b60debe7c0a4bf9bf9375fd693e5cbca
SHA512695c393236e3aa9a6ef6c9dd8ecfe361dc2c720aded18cd0ef849024fbf9322ebb01bd1bf43d2f08feb1a414b331769e84e2697192a370bf7db3e6ae45054ddb
-
Filesize
193KB
MD5473a5eab88d64e8ea7944423c831b739
SHA1bfbdf5a0fbc3ec3a15f83dc05b9c3cca8ec5ee88
SHA256c9cfdcbfd49e92b363fac87b23590bade475c9928da4b4a767c3f76444e882a6
SHA512afa7f7a23afa052216da43a88355d98e0b679e7f02ad5e835212a0be85d1717fef323ab1d80d34910981ce732e06830eb79f5793971da470c22064dbf48e945e