Overview
overview
7Static
static
7Lunar Clie...er.exe
windows11-21h2-x64
4$PLUGINSDI...p.html
windows11-21h2-x64
5$PLUGINSDI...x.html
windows11-21h2-x64
5$PLUGINSDI...app.js
windows11-21h2-x64
3$PLUGINSDI...uts.js
windows11-21h2-x64
3$PLUGINSDI...dle.js
windows11-21h2-x64
3$PLUGINSDI...min.js
windows11-21h2-x64
3$PLUGINSDI...ons.js
windows11-21h2-x64
3$PLUGINSDI...ics.js
windows11-21h2-x64
3$PLUGINSDI...nds.js
windows11-21h2-x64
3$PLUGINSDI...ies.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...der.js
windows11-21h2-x64
3$PLUGINSDI...ils.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...s.html
windows11-21h2-x64
5Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-08-2024 05:52
Behavioral task
behavioral1
Sample
Lunar Client - Installer.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/app/cmp.html
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app/index.html
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app/js/app.js
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/app/js/windows/finish-with-recommended-app/finish-with-recommended-app-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/app/js/windows/finish-with-recommended-app/template.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/app/js/windows/finish/finish-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/app/js/windows/finish/template.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/app/js/windows/main/main-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/app/js/windows/main/template.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/js/windows/modal/modal-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/js/windows/privacy/privacy-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/js/windows/privacy/template.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/js/windows/progress/progress-1-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/windows/progress/template.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/windows/settings/settings-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/windows/settings/template.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/windows/welcome/template.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/windows/welcome/welcome-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/progress.html
Resource
win11-20240802-en
General
-
Target
$PLUGINSDIR/app/progress.html
-
Size
20KB
-
MD5
3cf16292a3b2b0a8e8be4d5dec3fe7fe
-
SHA1
aea7bb7dcd69e29bfd176e4eb13e820ce3a6f008
-
SHA256
9a074fc3a4e2b98ee4855e9ae491d0c004659bc2db623f90fdacf3f2e4b07761
-
SHA512
0464aab09429e9c5c09b757a4d588fa1714cc9fe100e41559659a2aea1afeb5a10c292182e1784c40a09557222200a2dc2010007f64678e5de7178616a38086c
-
SSDEEP
192:ha/cVDYmPkhHmY74deqmtRCtmK8WQI9gHcMlxh8Bi9LJFHab4rmgJnc5t/93j1uv:h+XaMr9n2u53UA5ia6w
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687795732176114" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 4396 1916 chrome.exe 78 PID 1916 wrote to memory of 4396 1916 chrome.exe 78 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 4532 1916 chrome.exe 79 PID 1916 wrote to memory of 2004 1916 chrome.exe 80 PID 1916 wrote to memory of 2004 1916 chrome.exe 80 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81 PID 1916 wrote to memory of 4672 1916 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\progress.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81377cc40,0x7ff81377cc4c,0x7ff81377cc582⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1380,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2364 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4536,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4388 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=212,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4524,i,13077512863977802546,9571202551382860077,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4520 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD53bdfde66e886a3c1f58956c393669818
SHA1714398aa699dcae3917f7a4808ebd2f815e0eb2d
SHA256a5d807a91dab4a58ebb300580bf15bee2d68b04f53e3564880fcac542c142269
SHA5125a6615b3b8f548aa9054c220197635b136e42c5ca61a42935e8d5e8b6ecdbd0ff358c692e2a7379c659afdaa66a6105d12cc993d8a181b16daf0f1d2b73484ed
-
Filesize
1KB
MD519f699caea482d3a7a029c047653cf22
SHA11bc2e022ef29dd50b9f9c31d6f0f8028ed2e260d
SHA256ca97a69714356f1ca6dffe8a9a1bc3bbc6f69d99d6730bac5417dbc4914074dd
SHA512b48afc6b3361a7d9181959f493a93eb7626dac53a05074e7818bbc06404478fc9dace047c2002aaaa64c494e66b4f1e86d3f5a2e0053e46c66b375ab7da4359b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5c938c8f305e77c9de344561fe82570a6
SHA1c38386357596a511e491893a9d04d1d7fd9a3130
SHA256609cb43ecbd8d4f71b5addf385c8486c982479472ebc12ed7ed9dda4cf09ee21
SHA5120ba80a7d4c76e954eee7a9fc1d79f8933f581963bd091d321f8f2af9b1a4243e81c65db85c80f4d00ec17fa7814229173cded51bda2ea5c23416ec2178b2846b
-
Filesize
9KB
MD556fc9ee68e1251f4954d3c13ece3b712
SHA1c05df57ff1d843d7e474915c3dc7dc9df922a092
SHA256b2b403e436085594c6e1392d3675f6d68f2a8d90fd2fc6cec581fe00516f036a
SHA512081230ff65cceffb18f53025af3456e930c8b4786870fdacf387e41321bcd56ae34c5c78172f9caa73b9f54fa6d1b312356d06aeaf36212ba8810948c2f550ea
-
Filesize
9KB
MD538ac23112cd0aad2cf293a4351496b73
SHA1363462f40b4b1cc9f67e8c8b719e1513c37823e5
SHA256d01ca7a0faae8ccd366678420e42d26b169730467153341e14cad0796cd65e19
SHA51216e448b1f8093bba3a89d8bf8ce9895df117ab21d13fd29812a78b839f9767882ddb94ee99ca08cfc54cc2dca48436ee46422360385b9c321c484aafe2308648
-
Filesize
8KB
MD56c2fd47c9c6465416731b109d4d1332a
SHA18eff3d7733e30356d06deed4fd9b358212d31b00
SHA256ae272b31335bd0bfdd6e4029d8383028d314d8590946fc3d654a4c37266eeb00
SHA512c509a5170e7cd5f5a17bc234e9397f1c3266bf48d480fe011f8af13339a0d717e4dc4336c18de0e3245752d3918c351a702650084805205f55c6d910ba4220f4
-
Filesize
8KB
MD55c68ac251468f7aef406815019cbb4dd
SHA128ceedbabb5a6f799656b3189a52c5ffdf79cf38
SHA2564a5d517c3c05b2c5cc4e91c0e426ceb76ca03a238b9bb8e78adfc191ca858d62
SHA51289d36b47c048deace128a6565ec389ed430d36d95bee7f96b8a9f703179b06cc93ab4ef313fbbbf746980cce0e9d0c953c26bfd65a4dc11cc682508295ff5006
-
Filesize
9KB
MD5df660d92f8582c5c0c06ee24ecd28fae
SHA1ecb34e5c557b3e3749eaf4f6683678f3e9d789ad
SHA2569ad9c4b09248424d68b9a2044d9604bc3a2738fe5f13ff2b2502cf70789c6dee
SHA512a7936b514e0ec4826064a42684441938462f5fec5d61383549be4a2bbdec2b934b8fcc57560e9a6691eaf737b2fac38a9af72c6d3e3d1a51d9d2c901bd774090
-
Filesize
9KB
MD5443f8e368eb7580bf9d78bd4cea5ecc6
SHA10f941732ec730d5ceef57a02096c6d89c0995d69
SHA2567c2376d2a7f3ce1a73545474da0bfd6279674d50a96fa8ded194c578d9000ed9
SHA5120bd3e2905d0f64397d5f213fbedf9b4b196c20accea64b1337d402010f5a033407685c4d4674b9f35452e5aa9bec165493097dc72a64a054dfd3cacde9e24929
-
Filesize
196KB
MD56fe13199e6c4f8a8afabca9fbcfe1576
SHA1688e35d2263c53c7da7f3aa49aa81714c728fa18
SHA2566a5ab95d0de2968e85ffaf65eeee9cf967c74cc499dc8f6ac1c49c60705fc8d8
SHA512957b8cbf78830a0d7abf6805b254e50b5dc63ade4727af6861d6919c6397789d3aabff25fb2a553bb7017edffde62422e271f9f2681446f6d15900754e17b948
-
Filesize
221KB
MD501770e0fb5033a0eebec89a9daecd1eb
SHA1d8a5c7538d79a178b6659da045181a6fb21aa396
SHA2560fe4a115c840e4f6a5a9491dae26ede43d89a541234d8c3b97b79f0b8958fe61
SHA5120755a22574679315efae8c4e9479622823bc6858b254b7df9d7b309cb557d71a8ec6731d956eb074073877961dc508d9f3185c28c25a7ccc16d3ef98eb5558c4
-
Filesize
197KB
MD5eb1f57b642994f0b725dc74d6243c148
SHA1ceb231ea870ff0af7749f801a1c128885584d023
SHA25669df817ce8166c1cad818a25ddf4189d75ba8fd91cc44ed7a17d5b7fd48937cf
SHA51201870c8e99bfda4fbb03e83f2115598bc9b439696a6c51031f0a6824dc373b8b2efd544943ad4642ef72acee010c1b1309e03620ff74ac736028598bf16dc973
-
Filesize
197KB
MD53df6147b18abae47afad1c9af9dfc8db
SHA13a310c6a1eaf65645b77ddd5119b911b7110de97
SHA2568bcb88be45708e3e799b7c6df3c86eafefb1549dcc655e6b61acbc6db5749314
SHA51256f9b9bf338d6aa6721b1c8e799bcd7d5886dec3beb74077be621fccd66187b7d5edb834b81c2e631a60c413e116eed7cee137c0ac3d600d82f812fe5f65eab8
-
Filesize
196KB
MD563afcaa94bd967e193359b00e1ec6fc8
SHA1526c18913cc3d566fe7537eaad417aa0ed29d7c7
SHA256fb12d6ddbdb7773a2547423ac1e3bf8c3170809edc4efda3a079d79766f7fa5c
SHA5129b920641e3d02b5b91c65be1caff25bab298ba9904569764c32ceb4a999a0488ff298c4a08ab0437b9d1d404e6bdd0d3bd547bfa14f58d25c1d2841f36bdb140