Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 00:35
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
127.0.0.1:9001
91.92.254.89:4449
91.92.254.89:9001
fefewfewfewf
-
delay
1
-
install
true
-
install_file
Realltek Audio Service 86x.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000234f3-190.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Venom-Image-Logger.exe -
Executes dropped EXE 2 IoCs
pid Process 1600 Venom-Image-Logger.exe 2900 Realltek Audio Service 86x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4940 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133681557600645511" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 1600 Venom-Image-Logger.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 2900 Realltek Audio Service 86x.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: 33 1360 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1360 AUDIODG.EXE Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeDebugPrivilege 1600 Venom-Image-Logger.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeDebugPrivilege 2900 Realltek Audio Service 86x.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 Realltek Audio Service 86x.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4880 4512 chrome.exe 84 PID 4512 wrote to memory of 4880 4512 chrome.exe 84 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4012 4512 chrome.exe 85 PID 4512 wrote to memory of 4772 4512 chrome.exe 86 PID 4512 wrote to memory of 4772 4512 chrome.exe 86 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 PID 4512 wrote to memory of 4572 4512 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/bW5RBL6I#s7jCybOC6dPKwUdHm3qyaSFckiBCMQuX_B6bVo-YcLU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff0793cc40,0x7fff0793cc4c,0x7fff0793cc582⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4864,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5284,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5300,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5600,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5048,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2996
-
-
C:\Users\Admin\Downloads\Venom-Image-Logger.exe"C:\Users\Admin\Downloads\Venom-Image-Logger.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Realltek Audio Service 86x" /tr '"C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"' & exit3⤵PID:4284
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Realltek Audio Service 86x" /tr '"C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:4688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp829.tmp.bat""3⤵PID:1504
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:4940
-
-
C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"C:\Users\Admin\AppData\Roaming\Realltek Audio Service 86x.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5784,i,17864767397771253053,17578237128565629065,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5004
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x408 0x4bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2508
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:1736
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:4312
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:232
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2200
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:1716
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:1664
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:444
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:1184
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2240
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2996
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2872
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:4364
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:3372
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:4740
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:4408
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2784
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:3540
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2240
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:1612
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:2736
-
C:\Users\Admin\Desktop\Venom-Image-Logger.exe"C:\Users\Admin\Desktop\Venom-Image-Logger.exe"1⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cccccb2751f89cf04f4b0b503d208fc5
SHA14285f5efcce3b2c9851c06a1d3ad3039116a67ab
SHA256ecfdb00e03c216d801a03c309c4eaf5c3f1b72098e4486abfc302f689121ff34
SHA512181fa33fd063399a89c26e55045418eaa45b8cc15dafbb6181494dd53087777cb19e3f9723ff9a12fd52f5805cd3469bbff41e09c99772a5a4a6325eca10db72
-
Filesize
120B
MD56443bb7dd2be6455985f1a0470b832d0
SHA1564b8fe5a6433840daa0761749c08fb712e9a7f3
SHA2566363e83f335d013e86179c90c7453d0ee916ffc77fd0413ed25abe323857caf2
SHA51274d1064e5d8aa6267c69676216d023677bf1fdd207f417b0eed5ca7f3771f6ba6065a7c247fa3e5f57749af9654ad189fec4a2a84b0682f4d1e4408cc68ab2f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5228a542023231fc57f6e8f2c49037b5e
SHA11823310c9046d83eea0a8f302d03a691aa47c628
SHA256cb16b8bdbe7d00c6bc536a83bf67ded88504be18ea6c3acb1af05dd041c71faf
SHA51239ba0aa4b743fb65dd1a885df5423ffb6d1b3f8eaaffe586ff24a20aaa1508dcff34b186303c2ecedbd71806bd9cdcd90ea6ddaf6f2acb0243fbdad6a06bc24a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5752ae2ed084df76bafa5a89c7f185825
SHA1af5c84ca39162ca19dd405b24844608c89581100
SHA256e2074efd63874369639d3a10541b2b40ce186998d4826d9b84e42a06d0c2f752
SHA512c904a07e0cd0c17924344bc59a7deef4fe51469a9efac72982a4b26177a4c58d92f1e607d60260607f11a41262ad704afb56884fbfb8f7f007e99336a1004287
-
Filesize
9KB
MD5409af33a683f4f34bd5caa3cb617d1ee
SHA1a22109e275e1975cb2f368b6ed1c1898344fd681
SHA256a5a44b042db9435c04f1ff64e758b5244008a0415dae457757f33d9fb0baad60
SHA512402abc4b9887a83e750b74b11b14dd9987fff2b0612f05381eccd1a7a18024b4b059f3e178bcd41c0d7f0e169e469cc8ed5273088bb4ee587a6a9535b8b8cef3
-
Filesize
9KB
MD536f5e815f9b5cc27dd3d914ea5eabdba
SHA1b2932787d85d6badee23dfb093219e6b7a6bb01f
SHA256a8f7b907e1eb94262407d6af1fddedfe29482124ec5256f12073144e42b946af
SHA5120cfdaee8bfd9c544ea5632d1cd4af2ee84da8aeb29170a2c860b639e823413dacb4c929ced0bf6f7c04c9397af1009f44f98de3aafe0e98a6f0e311ac342c680
-
Filesize
9KB
MD5d407b4f8ab48a0f0399d7eb4222f0ecd
SHA1968dea64eae5c702eb38b1b45ccdf2e230fbed12
SHA2562cb997842c03f6925f429271c6f70067de35fa4c0d8897e2acf84a7b158f956e
SHA512a9dee112ec1dd072c2debc155f0e6c3b518a644c6460be19c64ad176807c54361c7b103068332f305112cb4a2ffa8587452688810f0ed3337502d06c109577af
-
Filesize
9KB
MD55522dc137e7c869e14c003b3f9fa2927
SHA1bd7f799ed2ea50f4d0e9f8c2af57305d179061e3
SHA2561a2e78ce11ad449d156db1708fb458cf0eabe777918911d3d9a34cd22c418b3c
SHA5124f8fbcf04585b354d10ea621012520f21166c798058ce9708a4f0e9090ca94be655102a19f6101ae475b988c38ecb05a517d5cdbd990b76b9d489e3f8975af12
-
Filesize
9KB
MD59cde4e7f632f5a1c65c0e72d84e5e73b
SHA1576977570475be6da739881655e42ffe78031b29
SHA256b94f83cc0588a1375d22d5c339747abb14ecb23951e9a44e2eec6d60e656970a
SHA51273c20d2e9039f9b4f5dfedb0b471bfd0c5d00692d37efa3feb03657b93648b5aed1b884a81036a3aaad90173b74c15b1d037418d50babb3083da5cf96f040503
-
Filesize
9KB
MD5cc840ac852cb0a74f1b72bedb6958a9b
SHA1db70df5259ebf53323a88fac4e08c7d0427d9dfb
SHA256bccc092b5c4ca2fe30f8fff9d67718f0c86ee6f2a71a114c9d0042b15201b418
SHA5121f27e4e8167665685232a9b7f66f9987b7ff754f9dd6d132ce87035f1354c2895ae3b90beed56990af285213fffe25966b5428d76ec1492e8da051988dcad217
-
Filesize
9KB
MD51c989ecff4a68f767bdc094e6c99a806
SHA1b4acf13fd6e9c60a10c93ed4e0e6f2835901d940
SHA25649dc247a08169b07f1d5bb9eda47a7eff0ef4fa335dd55e80b13e910990ebeca
SHA512f8d191477e152b9dd8eb11a6b7e3f3a95521f4a0a8bd4592e816100b38392cb9158fcd2d488284a8db42304a4b18f3b84dd0d4a1e540ccd92dc49af5506cc1b2
-
Filesize
9KB
MD599676b6838a18647dceac635db6f87cc
SHA1ba46f30fa66557ae5a1dc74030807541bd2c1f59
SHA256eec6fe7f854c3dcad003a56f87dd60cda946cebc4ec8d94cf4aec653997ba7ee
SHA512bfd832c04ea1079649ef6dd1f98083143a2de39f8e0002cf43320b1129ff41e0da7e5dd93074c357db1a8bfd9a5c0538bb9a7f33b9e9eeff0616bf4f07aaeaa5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5637b89228338b9c9d28b666de667169c
SHA118a641f6e24dfd9c9755da65ceae4619d3300f57
SHA25653787c9b3b84c5745b901087cc370cf99fce266ba943167be6279f3b7ed3924a
SHA512b4f232f4d0499bf45e3ce1a85cbcd9333f8e5b4c6dc915e35f3c034303e57cc6a4416c8880e0abb1e863817327f04fca1f785a39668c44ed995e0545986235c9
-
Filesize
99KB
MD55d2337e9cd8fa32bf5493f687252c4d4
SHA1aa9089bb9b564b28bb34e03178c1a5114a8fc048
SHA256123c9a7573639c873ef119bd2cf5b61b756abed71f6814c4391f40e6441b93b0
SHA512ab3afd8d4250da25acfbc5b73805983d3ab782f91d81bad98e63b03c06bb81e5e6282bfc3e58c1175bfbae48e83f63f481c75b488f0048c8915376e96aaa30a8
-
Filesize
99KB
MD563858846ec79f4dea872970505f5af28
SHA1a59c76fea2a20671a9d2c18117709b78a75d358f
SHA2565646e44dc6ec04a93cb6ef25552c58a9971c3ac8437c7cd7d09e6496217e4d9f
SHA5125caec3e25e77d0b9d1cf052d5bb3e30044067f7f0d029335e73eb53187f049a0e8d2b5622fbda7176ffb3925c7aac9763ee560c19f7476e9ef31e9a389e3e68d
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
169B
MD5901b9e6db27752ae3b2256195c3dac4f
SHA149b0a627245470258a6b54c2b9dd200b97968c6f
SHA2561790a290cd5e48d9cb68d5138491d7b24ae573bf8f409b7ef5ff196f55cfa9c1
SHA51211508964913b7c03306b1439ee61c53c819e8624966e3e61559f8b0ff8e7c3274816d9c255349294d62a262a1d2b1586f576facf7011b609427d4485455b943d
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
82KB
MD5401cdb3441eaa85c7d5d85b8cfe0fe54
SHA16bbb659c5c2b30c24313efa7a3775b78cbf385c5
SHA256f1cf79e0ebbb693d10ca8b96d6c6aae0176c3a3417512bacaf0016207e60492d
SHA512fb70afc7e5a382b3970cf92feaa12c4cfeba7a7dbca0d0f8736b5a38c0e4c42204cf4975081eab940524332fd3067bc4d5da053b55e71f983e01bc20454822bf