Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Lunar Clie...er.exe
windows7-x64
4Lunar Clie...er.exe
windows10-2004-x64
5$PLUGINSDI...p.html
windows7-x64
3$PLUGINSDI...p.html
windows10-2004-x64
5$PLUGINSDI...x.html
windows7-x64
3$PLUGINSDI...x.html
windows10-2004-x64
5$PLUGINSDI...app.js
windows7-x64
3$PLUGINSDI...app.js
windows10-2004-x64
3$PLUGINSDI...uts.js
windows7-x64
3$PLUGINSDI...uts.js
windows10-2004-x64
3$PLUGINSDI...dle.js
windows7-x64
3$PLUGINSDI...dle.js
windows10-2004-x64
3$PLUGINSDI...min.js
windows7-x64
3$PLUGINSDI...min.js
windows10-2004-x64
3$PLUGINSDI...ons.js
windows7-x64
3$PLUGINSDI...ons.js
windows10-2004-x64
3$PLUGINSDI...ics.js
windows7-x64
3$PLUGINSDI...ics.js
windows10-2004-x64
3$PLUGINSDI...nds.js
windows7-x64
3$PLUGINSDI...nds.js
windows10-2004-x64
3$PLUGINSDI...ies.js
windows7-x64
3$PLUGINSDI...ies.js
windows10-2004-x64
3$PLUGINSDI...ate.js
windows7-x64
3$PLUGINSDI...ate.js
windows10-2004-x64
3$PLUGINSDI...der.js
windows7-x64
3$PLUGINSDI...der.js
windows10-2004-x64
3$PLUGINSDI...ils.js
windows7-x64
3$PLUGINSDI...ils.js
windows10-2004-x64
3$PLUGINSDI...ler.js
windows7-x64
3$PLUGINSDI...ler.js
windows10-2004-x64
3$PLUGINSDI...ate.js
windows7-x64
3$PLUGINSDI...ate.js
windows10-2004-x64
3Analysis
-
max time kernel
349s -
max time network
331s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 05:41
Behavioral task
behavioral1
Sample
Lunar Client - Installer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Lunar Client - Installer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app/cmp.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app/cmp.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/app/index.html
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app/js/app.js
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app/js/app.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/app/cmp.html
-
Size
5KB
-
MD5
d7b8b31b190e552677589cfd4cbb5d8e
-
SHA1
09ffb3c63991d5c932c819393de489268bd3ab88
-
SHA256
6c21e8c07ce28327dca05f873d73fe85d5473f9b22a751a4d3d28931f5d0c74f
-
SHA512
32794507a4b9a12e52ceb583222cb93300e38c634a72ea3f51a0189127aba60cf476fb7918942355a4f826185d7071e876cb40348ba34cf5d1ca7e9546ccb310
-
SSDEEP
48:t9rc0/GLAoShbEHaLKNGiNQtvmolOGR36tgtr/GTvJP8AscaV4LiMt7ByBZXGz+p:4VLjHa2NGiivmmpWsBVutFwAk5vSG
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687789310052674" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2336 3380 chrome.exe 91 PID 3380 wrote to memory of 2336 3380 chrome.exe 91 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4044 3380 chrome.exe 92 PID 3380 wrote to memory of 4424 3380 chrome.exe 93 PID 3380 wrote to memory of 4424 3380 chrome.exe 93 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94 PID 3380 wrote to memory of 2404 3380 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\cmp.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff846dbcc40,0x7ff846dbcc4c,0x7ff846dbcc582⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1972,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1208,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4328,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Modifies registry class
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4732,i,4569165839607240331,4170060006449253441,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=208 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ed14b249799a5a2d75d0fbf0e3c5d485
SHA1a1251bc6052e85ba434809e6dac647ba447c8f4d
SHA256f5f15eeb3252f92004e53dd0bef2936460f70e919a0d14464308bca96a80d524
SHA5127b2504f4f33a4ff77f906371a3c0ced4924f2bca65ff3934a47b41d79b7931506264ee2d2fc7d636c5e7e66742d462a7ffee796acab9315e48f2ea221e00ccdf
-
Filesize
1KB
MD514742d413a72b74ec15d650f956f8ade
SHA18066410eb7b3be10cd53aa670a463a90b4308479
SHA256124f16cfe4ebab23462c2639858c63edcf92e516e7e06ca94b741d9521e080ff
SHA512715d49df22901263930853b2246853e4f9918f1e5dff12893c4cda3dfd260f12d3dc1cd801249d08155087409a59f6f03b10dda99a75d2ffe6b62f9904ca85d0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5e783a5248f885f08e42782fabe576d1c
SHA19fb34f851c1a4258ccf611e2c88fab13fd49ab59
SHA2563f0afc1bea71f57a860880a94386f97e2cd4052df2801f5bff523d7bcd8d8e2e
SHA51246bcb80ef6e8874a5f383d1ae950e23efaa6922c5507aa3a915853e94ec7d35176f57071d2c207ca0b0c309a728fb40251ea083ed25c4ea6536edf52f06ce9ba
-
Filesize
8KB
MD56b03f14a6ae76adf38168ee7e0a804c2
SHA19be05aecfab2d19444b577e04f683666768848b0
SHA256e653132c9daf29a2472ccedfbc1ffdb9e5085bc858c51763200d2c0e43f2e225
SHA5128bdf3f17942e21fd8e2bad82be6ea3cc961e580238d1d891ee06f51b4d1396bafffde7a1f12584de4a590db15aa84e21990cbc791ef3a21dd027570bfe30e977
-
Filesize
9KB
MD57f8781fad558250cfcd9f248a9824454
SHA17b623be26f982ff297f03b0c6e58e90faf408819
SHA25639e57eadeee46068d9b3cc65fdb4af6eda6a23cc3e3fabeaafa10286f68ae68c
SHA51221d4d10f09056c39e393b959285fc3a6b1f139020ddc3e0fac3a2b6e0f1d57bc150d55082de228139af2cac10d8f3956857232275cc40254862b5523aea2f724
-
Filesize
9KB
MD5c4d4fd36aae5687610cd80f3897baa74
SHA1660fff2dff690d1bc4c3c194b8b7b3b55af0f9e5
SHA256ee2d8edf8e46f99c7bde939481cdbeee393790136b024fb5c613622283343738
SHA512bfe576e5dfac80facfb645ccb00edb313063247d5f835e8ac50a3c6bac0a6f564ba9f2c48d746a1cdbf2563af82cb7e4abad9a418e15415aa4e3b6b3da7c64db
-
Filesize
9KB
MD5c4537b7ffaadd134ac52acd5b694a777
SHA10452b2ea0fdd02522bfeb566660e7c05bb1df523
SHA2567846447141aad035e36e5298f6e4bc22c4d6891ed5180ab85d8ab82e1541a8ee
SHA51207efd26e2285e810467621433fbbeee56d4cc2566d331e685b9212f370289d1c5ac34a1a23459b55ca262d025044eea31cf860b7aeedf7e9d1cc3bb98f327dc3
-
Filesize
9KB
MD5edb03f565e21ebb693ee22880996db94
SHA1d02e82000c873d0829066a65e01e098c2421f280
SHA256d9ecf2dcb6fdf7b7c068cbfc866e451ab0be6cf2f341a26753171cf70abad1ee
SHA512cfba985800538c25088283c88555c8950ed97ad4c693f2a8675fa595df6f34a756c51582bfcd26f9598ec26327aaec8e17d1c3d39ef40afb670b8fceaa1486cd
-
Filesize
9KB
MD52cd9169135da7d723ce668ff92f2f79c
SHA1162297a8d4f30219514b83651fa378d47e03797d
SHA256777e038478d99b250ca58c32bd0bb9fefb1309ea8392f6ce7bebf3caab578fcd
SHA5126cb832133c9b3c4e3341e138861c49af1ee9191be0c8503750d90af76f1b52305a5d26ae82719bb73698dc9d42ba20b1831d3910ee43da15c82b60dafcd6a222
-
Filesize
9KB
MD5df31ea2ab43906adeace0aada9d24eee
SHA104a47cddb69566ae810b2af7ddba615c5542ef2c
SHA2569d51f5ae039a11c75d18ad03b85906a61aa55a228b901b3e7da8f2e39cae8703
SHA5127f1263892119a2b21da3142a5252a8fa3becafec8bf91ff6d89ec40520234610d72c2727f53a985a922c767089c69525f66d2cef3fe6a3b563aedde3b3b21666
-
Filesize
9KB
MD5a0b864ab0953dba2b4908e21741a6d66
SHA1466ddb00ade20f794c00ea732d2262da93daefb2
SHA256e343003641b02d804a342cc86b3e821b1b82fc3efd04e4e2f838bf11095b493c
SHA512cdac7cfbd3164f80504835892e92fe47dd73e3057de9eea45ce28d70be7ef9c023fcbcbb689834fb528f284dfaecab6b78c69cce3c0b627b85a313598faa8817
-
Filesize
9KB
MD51996c1ed0293b4af90b2a19737d83428
SHA1318652484e158ee000423c99eff902af68e3d969
SHA2561e7974a149ff67738fd0d7ebbdbd3ed8effc90b448f25d771b13e66706793f07
SHA5120412c3e5907fd5a5e60614130c3ab164147b6b73d61a46e1952734396573358d518a6caac769c41edca3a88f702d79d959557bbe0386a37e9f936db92abd665e
-
Filesize
9KB
MD562177a2cf142ec3e7575c49da925770a
SHA104a5da37dc9310d56ecab4169fb9d252d35634e5
SHA25615b6cf7cd425fac132627cafcad5e43530c809c3cb71ebef48e4b9283316749d
SHA512f9da2f7d41cf6853a579b9dee3d422cc7a26c914f2a5e1c686f9404897f968fbd5bc6560ba8cad535b42cf739c19b777391cb667733213c3b61a5dc6e0a2647b
-
Filesize
8KB
MD596b5f37a5162115f30aabe71506daf01
SHA19e9919795b13195b63c39c2d9ab2fe9ffdefe7a5
SHA256a9d610926ba4e93fc46c44fd81d11bd3cde6c0fc1992fd58d8a89a0a7dddaea2
SHA51266cb64f2caf88f868d032a0bddf69f23472e0d14a3f6efd5cbf054854471abb7aa9ff5ab94895b811098720720e174b64013c941100422419eb1bb084710b803
-
Filesize
99KB
MD5958c3e7d480c5eb2411e14aee488a512
SHA1753264cee1787e9c88dfc7f2531ac1dfb49d5234
SHA25663d91a815d288509ef0fd8bc811bcca6d400da68531d1b1c61373731013d73e8
SHA51226146b42c489549db60c58a61dc50acff5c39acb1b37c6ac2dce50b33c33207777bb76f93725aad89c681a2a9b82f5763a86681c7b51b3dd874035e80177eddf
-
Filesize
99KB
MD5bcd514f7890adfabc225b04e9f9cf9d0
SHA12d795555a7533a0368137e3c71f3cc9ac8a2b199
SHA25695a5756c1f93bf903746ca73846292a630077112cb3246dfaba7550847122f14
SHA5122863fad28e6d64bfb02208932cae624a2b40b780db3ab728badc3cf78317728d980bf3f7cce6295319300c265cfb75b92fef8e07952289cf7479d33ce3d5c0b0