Overview
overview
5Static
static
1IM NEVER LEAVING!.zip
windows11-21h2-x64
1IM NEVER L..._store
windows11-21h2-x64
3IM NEVER L...OS.txt
windows11-21h2-x64
3IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5__MACOSX/I..._store
windows11-21h2-x64
3__MACOSX/I...OS.txt
windows11-21h2-x64
3__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...1.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-08-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IM NEVER LEAVING!.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
IM NEVER LEAVING!/.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
IM NEVER LEAVING!/ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
IM NEVER LEAVING!/tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco7_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco9_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco5_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco7_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco9_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
IM NEVER LEAVING!/tumblr_ndbp92G3n31qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
__MACOSX/IM NEVER LEAVING!/._.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
__MACOSX/IM NEVER LEAVING!/._ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
General
-
Target
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
-
Size
232B
-
MD5
0c1f81bde8548c0d78fef6b4a56653a4
-
SHA1
4228974abc0748762e422dd4605cbd4d44345881
-
SHA256
ae108e2e38a9ed7f997a07ede4ae19ac00b12e9e59495a70571b5bd6da98b407
-
SHA512
4f3256b1d030544a3d67a7d98f3b8dabade66fddfb0e6308ae16a78ee065619116c0a641581eae955ee52596207bb7b89fe9f6ef6d695b1c3d11e5b10196c755
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133679436003681173" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe 3172 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 1680 400 cmd.exe 82 PID 400 wrote to memory of 1680 400 cmd.exe 82 PID 1680 wrote to memory of 2412 1680 chrome.exe 85 PID 1680 wrote to memory of 2412 1680 chrome.exe 85 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 236 1680 chrome.exe 86 PID 1680 wrote to memory of 220 1680 chrome.exe 87 PID 1680 wrote to memory of 220 1680 chrome.exe 87 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88 PID 1680 wrote to memory of 1488 1680 chrome.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco3_250.webp"1⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco3_250.webp2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9623cc40,0x7ffe9623cc4c,0x7ffe9623cc583⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1824 /prefetch:23⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1392,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:33⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2208 /prefetch:83⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3100 /prefetch:13⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4632,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4672 /prefetch:83⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4784 /prefetch:83⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4284,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4668 /prefetch:83⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4476,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4452 /prefetch:83⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4300,i,11437769599888292426,10722660067315868611,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4804 /prefetch:83⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD59a3a59ce0798fd51a9e5e9b68c906016
SHA12764a156cb6db631b415b47ea403158e1416a351
SHA256965c8afd7932af91437f613c7c59838d30c8a3a96871fdd76eec2439c4155a34
SHA512344253b85c499a114015c05c8bc1a5bd47447fa3fc65d5b9168dc6f13fff5457080ff37601fd506788a2863791e78d518999e04d23ca8d48ad07a9f73104bacb
-
Filesize
1KB
MD5c5cccdb04862a73aada230457839c39d
SHA109d41c8aa7af24bc5ec86dade906636774e166ca
SHA256bb3b4092e8c726e371211173b7396bb3e9e8a75829dacd0b77c8d83346ecc6a5
SHA512ab496e546b104b7ff82379a3c3e0db361070144b44947df65426313f02d7cccd08f8416c47abceec6f0cde82b8a256b06a888321aa5f01855d17f7c0a01d99fb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD541af6c1de255bba48dc9c922ff5eefe8
SHA15fbcc84b74cad2b1977f017576a9f5e20eb0fed2
SHA2563479f2c7a61bc7626a6315557ccd15796a21a8c36b9b6ce54be75f07b7b56128
SHA51242e2f270292f3397baf6d479ac45902dc80f0e272f5459ceac7caa706db0f02e7092ed62ea57445906adee8f20924846635b3c5121f3be2e81b1bd5f45f9e630
-
Filesize
9KB
MD537555dd64e517a4df21de39b2789ee36
SHA1e6c08227156785ffa0be575238092e7e6a7e9ed0
SHA256cb0db870f616ff90d18ab1c836265b0b92ba4fb015e64871cb83882482e39fdc
SHA51214729ffd57db776659449b348c6bae3d1febdc987fbd1a6acb4681fc7e419cc6b586508fcc2f01e9611f8511d2e0181f7f40f82fd013789cc482b7ca80503ffd
-
Filesize
8KB
MD5d527aadc88a42556c106edbddddbef26
SHA1f1413724da92ef7f5289b71def41e09035fad023
SHA2562b67fd87de5e2729cb87e258eaf582a3aca373408c37bd643fabb62bb80c3d4a
SHA512f3007d794caa769b53a803806cd1cc37f2a07201fcdef19357427ebad3e266a99233574d5d5d96a2258f45c7d78ae1bbe9a87c3aaacf58177100363481c83f8a
-
Filesize
9KB
MD550d451732fce0cf95e7dc5a285645aa9
SHA19f58bb33195e8f0557179e8a26fb675bc493d334
SHA256ef13560a9c88e20c5e3ee2956cc287b59424346ae6d9c074fbdb6977df31e400
SHA512820a2245341005432d82e4aeedadc2755fd110e66d2c52b88645d806ceff80058a3c58f082ff63ca2a8bacde0f9bcd98fc92585ab69c0391230e22b9fb2de55a
-
Filesize
9KB
MD53371c1f5392824df89706b5fb846956d
SHA1b3d9ee3a4b61256e9457823ad53fce4ea6971ff1
SHA2565c1a75a6f9c350c7c1fdd93ce63fce049aa008ea009a10ff58e2d32ee8dd9cc6
SHA512b95e0e97d2f6f2a67673c1674ee2be32a836778d8d4fb153ac2890ad696031c4728a4656c54df513a8aaaf73999ab10fafb8c197b464df9ec0513d10e57ae058
-
Filesize
8KB
MD554e295448f9ada38dd06369397cd0c41
SHA1a09c1f167194bfde1d863a7292226e53ec9fd31a
SHA2567f389722e08f2cfeb7ea7d555511e0872d6c23ce3bf1d768726d626baa81eba1
SHA512f131bb4b375f9bad31f4a5f362352d560ac73207c3a4bb521383c4e25408f22a4d811ca4dc7f09ab81fda565eecaf49ad160ca6647e8ebdb997b593d4b955b38
-
Filesize
9KB
MD570e80a9653b3d7cf5857dacfcbd43cfb
SHA14743961c4e511904b58804ae757646e631c51ecd
SHA25618c60445b6e33d1865990e185756f4f40f60f35bae2928f31ed90395b8b6f048
SHA512277060e7519bba8f58299578ffee4338bc80309fe45624d4c4f76259d934df84d72d11b45e63793a714d7472b45550eed48519f56f2a09346611e05bbfd849eb
-
Filesize
9KB
MD5a58e4c1df2504e8b5bd048a98a2dd64b
SHA1407744a11d95792fffffe98fac90ca453c48fd96
SHA25699bfb9cbd0fcc7c2cde2762b86d454c931b937b61a11fb6d6104faba395de76f
SHA5123c6853642080aab8ad1f7d699c09ddc52a98a607f6e51abb6ec2a87396bc4826192872d7d9cf1b2e3adc393635029dc6e963d0a15a711769c8d2c04e731a4f4b
-
Filesize
9KB
MD5a1ec82c3419ca6c8f9334f5e01897670
SHA18d935c8679f53afc44927a3070065e9316dfe89b
SHA256cd6ba79ab4c3162cabf071b9a7381e65497de1bd911f2d29e29227b8734ff712
SHA5128bc713c6733c7adc9c144294024c10a5ba84a5219ffb8f3c6ceabdeb1a90633f67393af3a2132d1353327d2af5adab50f594418551194ec077d3ab3b4e6ff7f7
-
Filesize
9KB
MD585314cdd888b3dcb51e18594e410228a
SHA19e7d9b1935bc978906a162198544b32ca2fdffdb
SHA256afbd8b521c67d79e3a8bd32031500070e6b92810536b8784a975bed126bf09cf
SHA512bfccf8280c97a68a05470ebd3908d8e21582d0c0fa18abe11411654d72426fa4ff780f8a0aa0b1ff7f20cf05239fc83f68e368dafdf628964446b06626eb77cd
-
Filesize
9KB
MD58baea05aef5f1104f2c985d5ffc230c1
SHA1ffb9da09c823ffd1d2591415145b3dd23c98e8f0
SHA2562ba8b0dc9e4579e40c118bcd0fe51611a811a273577358081f8d4b626fccfa12
SHA512f9b2993079bfc531174b8c54e87d0cf19619fad61117d4d9113a9fd1e32a6a80ec7b29751907c228b51298464d0afe5aa300ea0f8e9ca82b79f9eabb1b3a3971
-
Filesize
9KB
MD51b59f81c278b6260244e11a203914d9c
SHA1657c00d4339a95037d8474acab2d335a3acde0c4
SHA2561acb9d6ea64a84ab0407aead8f83bf0207380d6bf35ee487847a4edf68002e8d
SHA51251576a6a3ed19c0a8cf0a3eb5566a62fe115e74871acd49ebbc79d2483f0b1bfb5860ab3bbc1cc1d8aa2fb18e6f99ed0e112f5dc0b4bc81f3caa33b58b0bf958
-
Filesize
9KB
MD5f205e33a36ee592b46ea020e28ba1dbb
SHA1def94d1797ad51bec62db6dc71936e3a783be147
SHA256e66d9fe640d25c7ce050dd937b111c4e1ca55b49cc780adce1dad5f9252f1135
SHA51212d37125225afd1083ab96898bc3a9dd808b59e98caec33c64413879a206b7af12826410b7f9d74738f1e5c156c2478eec81648c527e54571b0fca74f6dd9851
-
Filesize
9KB
MD500cb0b5c2321f2dcd64db49d2adcb9ed
SHA146749752a31087c9506f4a5888ace222738c301d
SHA2562ad7a78619d670aa61de69c3cfa6f9b3b57af8523220d73553f7fc46395216aa
SHA5124044fdbeeef253d36330c60f7acd36adc86f2517beed728e54f68f5288c62bca682de62d7e96fff9b27b5d12352e6b0d4ab248a98f29427baabfbb1bad3a0f7c
-
Filesize
9KB
MD556b561f4b24cb6b6961ae21472a31653
SHA1ba791e6c3239e7f54827f0dee44c4fc0b4d1a4e8
SHA256facb2fefc07c751f976eab1c202c0c20fba2370edfddf2786a41f66b1b32980b
SHA5120dc1451fb7799a414bf5ae38366a79fa922174dc698d8b6a93f913edcc3808ca503d8558fd47dcd9542f49767918752e6292c803829b631b70250d51bfa9ebe6
-
Filesize
9KB
MD597f5e8917c975e0fa45788e21ca2a8a4
SHA1056b4a14d77877c04344c0eb56ef26cdf413f919
SHA256110c2a8904e2f7e8f440c58e2afb769977556100c08854e0b53e24aeda2ef74c
SHA5128c1efad8f7b4e52f9d48fcfddbc25ff9d66b29459326268806eff504cf936327f1f63e5ee02ffaf3b4984ce3a8a3e367431119c1723d45cfcc3c69ba1f7d01ac
-
Filesize
9KB
MD599b9c8c2ffc2f7f8c110f5e050d42428
SHA18434bb8fd4e7e34a43ff167dc6eb77b4e353485a
SHA256d769a895766c95544e6fc1da43c468d6d8e56ec704eed69e36e1b4845dd7a462
SHA51242b88f9dcabdbe24c584214b0ac574c4f68e13cc86583695fd7f3e31f2dbf897ce31c7f8de40faa2f3705d06c1b06a9579e4812ca61a053f0dba58407263c3f3
-
Filesize
9KB
MD5627b34418f10d94d8250d210025f2b57
SHA10b0f6674d5d137113992b8d23cbabca8017162b3
SHA256819ab2b4c5e23a7aff8b7b10453dbbbbf06b2548ff032329bf2b9f47b9fc3c0e
SHA51281d22e2fd47abddacccddb735ffbac2ead398495d7e4502ac280e4440b340e95aad9c232dd09923db1a1fed66c1157a03702aec13d893fa73808f9cee2ca56ee
-
Filesize
9KB
MD5887196bff118ae4b47e61f60d2623600
SHA1db3bfd7004835df25323d53ec7512119a65d62ef
SHA256c46571c2f3bf0abb3db7d421303964a84e7b2e2960e0a9dbd0153d1647defafb
SHA512f04fc049fc788c54623ea985050225a87979b0a2d0ce73ffd5494c5bb77e9ceb355adb4f6a93f2d7256727ba5b7c9caca16cabac8ff576deeac5ea6e136030fb
-
Filesize
9KB
MD58c346b1b433a861cd2de23d3ea9132f7
SHA1056e6c172acd01f10a62e244174cc790f37c4249
SHA256403d78eb297c1a9e25e86c2cf1f31cdbb1c1bd784bdb2bd5bb704b99d2725529
SHA51202d612bf1cdc115554da6dade4e2a7925751f085cdac59eaa64157482b86dc2bd5cd99d7319e594a5bbec7784d001b8252828aa9f95650d182b3212f4d82f27c
-
Filesize
15KB
MD5e60edacd901b9e916bd2b182dbb342e9
SHA1449d84914c1f8e166094bbdd2e29f7389a55ad45
SHA2568a48232dc1177b39de42dfcea065f5d2685e575b4a0478f43af2dace4d2cfd87
SHA5129d98b3cdd4e993d89bd4876d562619a2b9819c2d0d62bfb911a3e7d53abe70952d99b4203fba7b95a05f11be279ec0827ca7aea96f0ba1b39022d4880a54d531
-
Filesize
101KB
MD500dd79249dbeabfd3347078a521c5308
SHA1ae5b96adaab241abe5a8ce50af10e238a2167b44
SHA25661722d36d69c2b9efc26bb0876425fa38a3feee51092db55e3e5026ca828625f
SHA5120d0bf017edfea3af84a3bd5ba60de9b391e88d643151e23a1bbed330dbf0825bd305f58579f86b5a3bea5fa2f92d59f4c6dbaa46e409cd9b66bdcc720477e37f
-
Filesize
195KB
MD5f42f3e33006637a2bb809609470b40d9
SHA1f0a9f1e00b0407a8a559e5292624b2a08827114d
SHA2569d4feb9f4b157c2adb55c8bc28414fc418134dba4490df2d9f05907ff51fb6e1
SHA512a2834a46d24c2342cd13b170934eb6e0225921c4ffc9dc3f8cfb384402fa24d3973f688db42dd43b77b0a6b5012d31015ffa73a6b0b347ef1547909d31e85ab3
-
Filesize
195KB
MD5a044512bcca238b1c361e394f5bafee6
SHA1c189e0c733a209902bb1849ae4316e9f7852f842
SHA2564a449b4bee8868878d2cbfaabf7ea78c22624350edd4f0ef138a24e38e805a73
SHA5121dc7f1e710a9d450924860caa8cb9f0589a4c84ab24c8960bb6ac3dbde256aad6cd10003c4cd81af4ce44131c27460831d7e61e5732ab7b30413a02c09066a86
-
Filesize
222KB
MD529d6dee76a10ef9ed3acc4c231195090
SHA131406b1180f4d231a17be21730c4505764c26555
SHA256e5e8723bd3743dde3c654e806ee9a009e4b170a0a2f3cf30b358d5b79a53493c
SHA5123d193f43a3175cd58f40cd4dec354fe65238ba6540626d659b63217e9270c0bc223e4a061929103bd2bc18e813f4c61e3cd0ad624681daf43f4316de5a54a79d
-
Filesize
195KB
MD5bab9fe9768d63f81e8e24a064cc447e6
SHA190fbefc162330aae8a9191b362b27e57882d0c44
SHA256c8a78d4c22c0aa02c88a4ad7a211ecb75f79e6a319bedb15e9b6b84e52cd8c0f
SHA512b59a0adb2e044835b9dee770cf5586f3a4467c8fae9868cb4a7a0ec81dc744b1616cc1dd8a4ba51014aa453ef220c57e831efa3cd4cab097eaf36a32fe6456f8