Overview
overview
5Static
static
1IM NEVER LEAVING!.zip
windows11-21h2-x64
1IM NEVER L..._store
windows11-21h2-x64
3IM NEVER L...OS.txt
windows11-21h2-x64
3IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5__MACOSX/I..._store
windows11-21h2-x64
3__MACOSX/I...OS.txt
windows11-21h2-x64
3__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...1.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5Analysis
-
max time kernel
599s -
max time network
488s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-08-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IM NEVER LEAVING!.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
IM NEVER LEAVING!/.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
IM NEVER LEAVING!/ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
IM NEVER LEAVING!/tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco7_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco9_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco5_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco7_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco9_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
IM NEVER LEAVING!/tumblr_ndbp92G3n31qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
__MACOSX/IM NEVER LEAVING!/._.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
__MACOSX/IM NEVER LEAVING!/._ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
General
-
Target
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
-
Size
232B
-
MD5
910c5aaa16d4486dbcc3111e3d7b0db9
-
SHA1
0a5e67a0e1d8b90c272b5c46df4c3d9806bfa782
-
SHA256
d3743e3611a5d78e53e06ca7eaf4b45bd6d5de533c9586be477e847a5e3ee994
-
SHA512
4fb64e6e45c432b205203d7f956db8052113023c37a51bb82b15bb8c838bf759be755d85a7ad8838be9bf10e7f10d39cd17d76c947fd275123d223921379994f
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133679436015367297" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1448 4708 cmd.exe 82 PID 4708 wrote to memory of 1448 4708 cmd.exe 82 PID 1448 wrote to memory of 2128 1448 chrome.exe 85 PID 1448 wrote to memory of 2128 1448 chrome.exe 85 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 3920 1448 chrome.exe 86 PID 1448 wrote to memory of 2164 1448 chrome.exe 87 PID 1448 wrote to memory of 2164 1448 chrome.exe 87 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88 PID 1448 wrote to memory of 2392 1448 chrome.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco2_250.webp"1⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco2_250.webp2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff924a9cc40,0x7ff924a9cc4c,0x7ff924a9cc583⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1820 /prefetch:23⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2108 /prefetch:33⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2284 /prefetch:83⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3092 /prefetch:13⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4584,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4596 /prefetch:83⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4740 /prefetch:83⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=212,i,2146905439214808537,8519596744122074633,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4664 /prefetch:83⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4899447a-7f8c-4dcf-83e9-5ba2f0e1686a.tmp
Filesize9KB
MD5798132201e01a4d56dc6bc78cbb5587b
SHA106e397e99d7ac11089d7f33312985192b8f07b78
SHA2565c9fc97ee6c5172016dc3eb58857195c3b9b8efb7d1109e305d4ec3df95df6c9
SHA512e2b943877dafa8edb98404122a63b6ec4c95d05d91ded7d657865b304a0603a2189aec0b402580ae36d39ed92d7a0eb8fc1737ef1c36c531bf0c06b11aabc688
-
Filesize
649B
MD581e86eaae66f787b1e1d25d1dc5f5fa0
SHA1894678e4100912bf8787c283d6561855a7f4d56f
SHA256fc4ce07be0326e839f0931e0d9a8ff64719abbaf83afc2ba39b5b6387d0726e8
SHA5124f47d6f88f245d0967cf798acba24281fe4c2ff0694dc12145f222f06bb2dbe84c44fa768790baf52f8ee1049e8d9762272fa7363ee6b39051de5b2e6d7c9972
-
Filesize
1KB
MD55a3076aed5101029b9eb17513a7026ce
SHA1401ed3983202c3294942a3d135f8ce7e7d99bd4e
SHA25699530cc23c2187440fb4702c18275be023a06e240c6bac949535ec5f4e6a2516
SHA5127d1af8247b77eaf0cd7332a916cac14701202d0fa44eac7b401f3a546248c899ed1e73d594d8a1baed259e834fd237896ce02b63fc467356424656808d54de54
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5eacf9c5a023786c54e63c35b7e51c0f0
SHA13a383dcbba759de94493565e1956b3e9cdfe2af5
SHA256572229a05345c36d2ead498d6f870da5d25e1e6513103d184b001cf41e844cc2
SHA51264554aa1dba07171a3a8c319f39e619745fc08533592baca53d48784e35a50f269773fefb11b2bf254d3e8a68160540bd7074e68832a8b4885be481b2ed208c4
-
Filesize
9KB
MD53ec5c444fb34db111c0db228ccc99914
SHA1478270a3d920f0752bf1fabb0d1fd2bc093e3fb0
SHA256ebbcc0e865d868d5ea49eb7e7db4a8ea4e7190cb739b2c27722a94c89a4e6ab3
SHA51262043ff342a8aa74a4e5f47f139198c245a95a6707ba5a10666fb884d987f090b1f1397a0894ae14c212abc6c5278efabb536f0235fa704ef201aefd552c36d2
-
Filesize
9KB
MD5797238bf7ce15f04a49912836f7844a3
SHA1f477e54aab23d02f6a7973fcdd022af1bed4a38a
SHA25652fdf0d8fb497f32b9954e08d0fb9aac1bbfc19463697c4b52049aaf2ef364ed
SHA5126b2296c9e5f6023aa752087f4a8baafc99b692302dae747510d71e35338898b16b7d9a65e112a6e809e180fc161d4a36eb4a62f960e64af83276068bccde76c5
-
Filesize
8KB
MD55470aa1ab56b03d7d0ad0622e969df9e
SHA1396f8f247f336ae22cc4778342b74f3434a8c4ae
SHA25613ab1027a4dca6b7983fbefcc0a582598b43a49b0f42ca4152bf254a79a55f4b
SHA51290da4dbf014f11271cef6228380f79522018fe64240fbb11526215480e1e620009f98bb5a60ec173e9b1211dd2d924fc04195125d1abad4d4a896ab9bbbbcc18
-
Filesize
8KB
MD5401d1b1c0e901f4b23595237b74095f5
SHA146de68fddcba329e83ea469a944ccacd28beb483
SHA256762db121ec0c80ea1aee3f87f7e0fc18dc5a652a3ae0b8edc8197f54bdb3c80f
SHA512864d7c16e87fe104b0ef14585ee719f300ed7416039efa993a75aadfda68969fce0cf4d97101d9f03db71899ebb82400519246857109c14fab67cbb28a13c5c8
-
Filesize
9KB
MD5cc238a1cef7bb4a8a66f41f8514df0d2
SHA1b00e7c01633e674af5bc3ad8934414bc1d98cafe
SHA256ab68aadc230ae3ad5804910085a1d7762b4b2d82e81935e3417a38d40a6dae93
SHA5124a755af0a7a3d623078a7c51aac95e3eb941a34e843fc2fee03d04f81e82974089e6e31d4021f44406a8a3603d69202b47cb24a579668d50264459ea93a904ad
-
Filesize
9KB
MD57b6f8cf5968a02f8a0afd6a6fd5843a9
SHA1f0836839995782034983d6ebc952ca94c40f68c3
SHA256c9d04a7cb38398697d0076491102085e245a276b689fb4b66542f3da27b9c87b
SHA512173a26c5aabbeb8862396080d26df036aa8f0cada05004b832da4b315f77b8b750d64a5273c19828ba3bc03f65e709e66106b09a98b043ed438b86cd0328d95c
-
Filesize
9KB
MD5b8bb3493c2e0ca1654f13bae6b6f22a0
SHA102bf56e051e37771bfb9ff16b7aaf2c984b3d722
SHA256c5d427ab0df74cc7d37da621817eaf5c0328293238dca593d936d8846041d2ea
SHA51216efd219248ed7fbb9876258884eea37cb2d7b3a26937e4a799046a7654348b27af81de2087dac7576eeec8ac0dfb0f99a7a70c32eca83f5e758b624421d27ee
-
Filesize
9KB
MD51f87f955030f45ed204176e313542f50
SHA1e6fcf364d2e88537e646667f2865c32f61a976aa
SHA256007dbc38b3ba5e41d4070c4e9df8845901bba7cd0f7f9c972f3e080e1daa00a2
SHA51232f68468aa29b1dc09bb349497ec370067d608cdbee27e6d69fb770f678fde7fa35f98ba1b8428b41a86dd6db8c75644b40563aae399601625e246d0a0f35ab2
-
Filesize
9KB
MD59dbba05c301986bf88d837a0ab1aef88
SHA1babc94151eb1f22ec9aa2bc4355e95371a5c2076
SHA25678a4c98b4a1f7c547d77b77f38c78c73f45cb286a8c4fca21db3238d59170602
SHA512ab019c6dba119328a35a9fb88726e88560f49ac60c3458253c2cf6123bc6e13a48f6782bb26272a7da131ad8ce221280382ac77d06b2615c13d5532e3db56d9d
-
Filesize
9KB
MD5517267ddd1d953f835df90c4550cedb5
SHA11a2356b660b42d459645d2e512a3253731a498f0
SHA256e5da615cc213fd8094b4513ee823ac80d4bb8b95646283de1c167094102c11e2
SHA512c122d7dff141ec183a6ae893ed33da988d02652a6d2bd8395d7578eb423910b85c15e2bbd0e87ac817d761ab1c763def73870e8f0b17b8980938e7cd0f20d3d1
-
Filesize
9KB
MD5c3344c6d954eb1d015a69e8076cc32e9
SHA1068897cf8ffb7a035217951bfebf8f9d930f2f7d
SHA256f4e525578189c990ca1d3c1753f07bb3cebc926a9f2d39b1be34589844b52b28
SHA512a5df18de6613a8069eb9eac1e08b95b72ba53813c304697a3e8d34ceb698d421543374cb8b6c9e859d119cd789f92497ab424ea4269ba95d785c95ef75ecbdcb
-
Filesize
9KB
MD51562519d6caa144fb478a5c9b06e4a74
SHA133ebfdd14c862afa2482f5f9ca9110984c9edbd9
SHA25655034ae4d45cb027835976f32f216bcf6f377a1db4657a71b86f97d75b6d995d
SHA512f9695821947862b96fa270a64ace091e9c6758f58a8aaebe588ff5a92e403898ac74dedaa65dd8cc00c9a98a8f4def58bcb76c47c159c600f5b7d11537fa2edc
-
Filesize
9KB
MD5ec6603fdf9f89312f2c9c2e6ef46ebe4
SHA1ac7d1d846effacfad75226298ffbd9d991c78d0b
SHA256afe2057d2fda1d57e0a81c99d8410bc2b86c758e21e3f23862316fdb1a3c0cf0
SHA51269dcee5fc6da0b4dfebd52881e88860b1a9a00fc443f0f1194b30e7053234f6b116ecbb82624f240ab5cbae5c1a55536a817c3c35735aa5ba982ae3afd546533
-
Filesize
9KB
MD5a242cb6fe16da551beeaff8c9fe96c36
SHA16f8e1e7771c72fc8780eed08dc5b4201dda265f1
SHA2560525d52eb5105d2b462305c06f8bd872ecfa7571cae899d1b3b522bfffd5ac66
SHA512f1b792e540bfc33f45cb34729898155c58ae38c0b4517dfe0b07a6abcdbd570d8490e8825173321e761a3b27eea605cd616056cad52846c26c0932ce0af9ab58
-
Filesize
9KB
MD51d153fc3dab38584c17bcd246531aed2
SHA1ef324dbdaf07bc664215b1b5ea5d7b8eb9d12f47
SHA2569905af4efd5ccd4466e7d16ef37ea33b8293e623b23638ab152b19f41df561ee
SHA512d83b9b2498ff47e080ed482cb44c4c7ca9f02f566c42ac3d66d046f12bd527bcc9c66c416a42e96e8ee32e57c63dc0adaed0c62fada96cf3cb546377fa5f90db
-
Filesize
9KB
MD55093c107e90a6a356f6d1888551814d1
SHA1de00482cf8f25156b89dc5c668a05999c849760a
SHA256a4ccdeb7bb60d669191142b361b236b4b814ccdfbb9ed16946b1a7c2bc45dd12
SHA512b65e5cf1f48ebb4025afcb917f93d65734e5e6aeffe9e156550f9e420fd55278adc7cbdf5367c4134f78d352539205912d1289f9846cecd08c031ee22bbf38e3
-
Filesize
9KB
MD5d79697748c0c0219d38cfc1404991678
SHA10c3cc47404050b3918fd2df5747b43d19ef7812c
SHA2561e20e8ca3cc175fc74a2d9a51f4f2fbdb97839ba3cf8945827d3bcbd81b3dfeb
SHA512f31e4fe30762ca2ec5e49f47e45c9dd464105df0e22fbd00968559d4e8f87c300a0cd8cf8c3ebe63ca28d4e0898af7cde79f340b854eedd1d0d53c36533810e9
-
Filesize
9KB
MD566fdeaf02b7d7a5cb70d52c812636519
SHA1fa39e46e5b218f6289cc797f5b3eb538d73bd7cd
SHA2562565fffc9f44b6f5f3419742fb278f45487f8d5d82eafb61caa7508b60f2f24e
SHA51208a24c7e7448b16d4c3f102a28132eee57528a421997258b0edfdef51d52b0df7dccac30d083da431dd7843a9e0cc63481ffd5b40e9c9739a9f0ef14c91df595
-
Filesize
9KB
MD5539a53881db40639c28c554982cbf6fa
SHA196353e4c37b7a78b63a1557ddd5b1df265e794e3
SHA2564ee63949fcf0e15b9cb85342a0fff47dd3b94a417e9a984cf632f8c616775722
SHA512e220583a41be9646e0fbb86636b4a043a4cefbc809fe02d192ed831c6ee987c5a5bb9fa44c0c0ddc4feae7756754f5b92c40cb21aa77fa075d140ac94cef13df
-
Filesize
15KB
MD595758ea39d361d2fb2319101cfa0333a
SHA1c4b25268f6071c081252794bb4717c05ff911056
SHA25630442d6bb70c44e4463f931c078cb1804ae3e5ee170a5554f4785c7f7bc685f3
SHA5126dbce3aaca4b140fa8325d40708fee70429a55cfd9454903c6705163137378c117bc1bd44ca350ac7a7bdb803c5ac25cc9ff6f9ec0e17a5d09746a09c8eef02d
-
Filesize
193KB
MD55fc5796b9db6751e3c63be755ba0ba84
SHA19c2aea992b509d63a20dea9318889a25230c3819
SHA2566173417c09b6f80765fd695bc79b34bc8affb9792709c936d62336dac2403406
SHA512af61f76a7ca0f9a1b074cf586b930c7985e473eefa4eb497e440bae53d918fb042ac5b8c00d095e4d7893477671075ced0ee633236cc3ac0e0adcf2e315ebd76
-
Filesize
193KB
MD542cad81c1b13bf6084d88cbe22a23e02
SHA1f29c33474f45b4a904f5ae2b8cee758ca7cd2889
SHA256034c5ec3dead7b3e207eacd8afae4cb0e7bc68215ec27df9b9b1ca80565bedcd
SHA5126d922af0d1c921cb840c9e0b0264cda72f9dbda62d85cb672de19145962ee4bf26ad58130343f9f10f92b11c6aee62eebf5276d27570824aa34d6a80feca5deb