Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
CeleryApp.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
CeleryApp.exe
Resource
win10v2004-20240802-en
General
-
Target
CeleryApp.exe
-
Size
8.8MB
-
MD5
74c366b46a85acac6c83e9671e64dda7
-
SHA1
dc9a7b4cc7511b701401aa86e0106d3495e3a0fe
-
SHA256
6a25cc6c05e54ca56e8b51d2b2bd8b9a17a96ecb1d1f6d4442d36378dc809ed1
-
SHA512
e0df64a74c3c9e1c36f5957d346d961cc92741b1803e05d41454dde4371a0e9420f9e79163bed9fe2d8b588b9da6f2faaa08003ca50be37a6425a8320acd15cb
-
SSDEEP
98304:wEgLIRfyC7egWJ3iJzdjf4fwraOWcD9XdMPABIw/t6KHDicVwzUs7:wEguhegD4fJOWs9XNBZ16M2cuU
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133688697359030403" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{D8E7D833-5780-4BF4-98FB-D139B7B1DBF9} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe Token: 33 1032 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1032 AUDIODG.EXE Token: SeShutdownPrivilege 1120 chrome.exe Token: SeCreatePagefilePrivilege 1120 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe 1120 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5704 CredentialUIBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 668 1120 chrome.exe 98 PID 1120 wrote to memory of 668 1120 chrome.exe 98 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 2320 1120 chrome.exe 99 PID 1120 wrote to memory of 4128 1120 chrome.exe 100 PID 1120 wrote to memory of 4128 1120 chrome.exe 100 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101 PID 1120 wrote to memory of 4056 1120 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\CeleryApp.exe"C:\Users\Admin\AppData\Local\Temp\CeleryApp.exe"1⤵PID:2020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd9ba4cc40,0x7ffd9ba4cc4c,0x7ffd9ba4cc582⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1976 /prefetch:22⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1796,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1600 /prefetch:32⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3644,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4896,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4544 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5308,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4560,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5180,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4940,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3268,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5692,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5676,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5228,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5108,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:82⤵
- Modifies registry class
PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4840,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5904,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6076,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6688,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6820 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3236,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7024 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=3248,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6692 /prefetch:12⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7572,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7484 /prefetch:82⤵PID:5460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7324,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7368 /prefetch:82⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7612 /prefetch:82⤵PID:5564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7724,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7384 /prefetch:82⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7348,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7840 /prefetch:82⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6976,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7848 /prefetch:82⤵PID:5664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7376,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7820 /prefetch:82⤵PID:5888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=8032,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7744 /prefetch:12⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=7896,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7904 /prefetch:12⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=7132,i,2591513413754851635,16027519518434882378,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7300 /prefetch:82⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3200
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x468 0x3a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainer -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5eb942bdb6305f3315f94ae3c05f48dbb
SHA17674299d7f21d68d74ebbcb1de993f2c99ea6a1a
SHA256e306a68470836c921619dbbd8ec7c697a25625402fc95add71250d41231787dc
SHA5121509991d75b19506b3c4fbee4b75b5caee8e5f1ec7c810d4cbe21ef9ffc32b472851c25da616fcf8cdd9a4b4e57bc5625eafa3d1803f2e41c888d449a2972c4e
-
Filesize
649B
MD5b35b88bf66f3e382963f2845e8dbabdf
SHA1c2608298f6b37425764e0dd3e3b9e3e032169b65
SHA256b02df2fcc8002738193de405b2ded9af9744faf8adc0101fb7c1d8d773cf8565
SHA51216b7b4e753e63e250ad5324968b966e242750ff6ffef157749b708ccaeecfd4e7d61f4ee27dd848cbd460ef01000a90f6168dc0a78e511049ec19a0d80ae11ad
-
Filesize
128KB
MD51e35518daeb96a14c0fe1c03ef09d441
SHA172e19f69d8c1b751886f02d1b20cf87c5f95187a
SHA2560130851cf68e329fab9c839c1e6805d93a4fbc5f41d92b7966c8d6928d2d865f
SHA51235be0b80102e4b57478dfa2f74f1891d0d9d7aca3f3fb94f5093dc84f08082b624ff8ff987f7f86562793deb5ccab062ff52b5d9cac3f29f99aee692f684a400
-
Filesize
123KB
MD5f0d1ad548f334298ca90931cfc6666c7
SHA1b538b05f89eb2e12174b44e2aae185f7bd480b0e
SHA25610088cdde7cba1c99c0f823f678794cf25763bac67d6f663b92cd8018d9603bb
SHA51235324fc2c19427df3b009e78e43aa51cf823b93ecd68751f8cc8655c2484258af298cc9e087e5a9d5ed8c21cc4c7740f0d58aec7d2f74e0227789fa3e3818c55
-
Filesize
67KB
MD5ed124bdf39bbd5902bd2529a0a4114ea
SHA1b7dd9d364099ccd4e09fd45f4180d38df6590524
SHA25648232550940208c572ebe487aa64ddee26e304ba3e310407e1fc31a5c9deed44
SHA512c4d180292afa484ef9556d15db1d3850416a85ad581f6f4d5eb66654991fa90f414029b4ce13ed142271a585b46b3e53701735ee3e0f45a78b67baa9122ba532
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
480B
MD5d45a321c94b69406bbf640a55a3aa477
SHA16c5b9eb92e57ec23699cfeb993f70f8ed936557b
SHA256a4b8a746beee66758d26012c7e221af12ed83eaf4433ccca853508b9b86c40f6
SHA512219caa98635d0083c35263bfa0f7a69e8e7de1735f22c581d5a8b7ea840e1cf0d67e0523b054981827d268ab494f270cdc8dccd785541bc8c31bc7c637cd92ee
-
Filesize
264KB
MD53f20b57dd665732d3c352aa078fda7a4
SHA1585d67b8b2431978e148cd7fe496a7a9ed9f5d5d
SHA2563da602c177df8370ff98f045c875ce47b05c3c20deced2d1c120bc9402b41e24
SHA5123373c89e87bc4ae72de12cca285ad0d0eb08641147592de4429681e802f45d3c70acb7312206e7baa2fa9f2c73327a2cee6439a30054d0cd5ee63189ff67e56c
-
Filesize
9KB
MD557daf641828c07a760846499d2cec0aa
SHA16706b99591a8eca8adfe9f41e75f4cf70a64ec27
SHA256e4fd23545b1ba4d6b8535c148f946c741c75cdba7a47198827229bb963ecffeb
SHA51276e90b247f55052f79e0c1c384b65cdbd959caf83a6f7aa6ab598bc08d839a015a3b4f14915c1f7382336ed378ea6c4c1260d86c33d20847c5792b2c6c7a5481
-
Filesize
8KB
MD5dd83539d2e92ba6546f5b62e7f74947a
SHA1dac9866db0f9c1dcff3880117f48785b79f0dd30
SHA256a8f48d1f60bce149e18c4297bb4d7eed42a4c906fb0a5f6a06501644efa037f1
SHA51218942aa06e3a6025dac3cec1fcc764b45d21683c6b2450908c4563561f5fb2896f1a36dbdb1d58ef33773b7a0447b0d15c2ea5405b0dc198edd97aca82b04382
-
Filesize
1KB
MD53003dba54625023dfd562995dc041901
SHA13243866fe40d8de5b56d2fa45857ab98deac232e
SHA2563da1d4dbaac3252fe56b30ac84a8ef4f25da1ed178b1971e716cd8ddcf4ec6af
SHA512667c8a381adccaf0cf5adaca980f522ee088297b9e5db7a1253c92bd9f0caa0025b178d07f64528524259702a71044441546dae0d6e38e58f4f270b0b8dbd1ab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD58daa56d30cb56d5c83ff58262255a4fe
SHA1a80e5d9a35f28c14f0967c98f0a867935f41c4c9
SHA25684f4952645d13f09afe761e0fd130618991ab290c309da119ad771d9db6de1af
SHA5123fdb23266fa064dc664d4cb2c2e12a743c6e42a513986932839eb3ead1cbbd1851dd4ce7c99b80886aa427e048c7c79005488e6d624fca5fb31e00a953a2c9ca
-
Filesize
356B
MD57db91a6da9660d31bd826779af82f091
SHA1a37f422ab099b2dcb85f07b958c21ab4f6f57a3f
SHA2561817c4c02d59dafc2caa2451f9965a1ae674c7d3813c6face3a81ef139cc340b
SHA5124be9a06d0fdb4889b02e07f79f73c3a30b5a971d6181184a57410b387d23f241fc20c8b9e563b283d99a43da84c179f50b5f67d8f5e6aee9efb1c0164cecf9b2
-
Filesize
6KB
MD564117876c0ad62f0743cd0a18c3de9a1
SHA1e2f53a7846e7b3dacb9e3bef4476c17224ca31fb
SHA25614d30515f73db361963c84025620f2ace31872e67e1b5640f1669e600886d4e2
SHA512e31e40ff35fdc3c26f9cf8869f2dcbff7275f42a0e921fb405565e1f9b2af86dad1ea1ea8370180bbbf91e8d48cad75357b692989312a799446392ab8d5cf124
-
Filesize
4KB
MD540330f44da1ca5bbdd1c219fba27641d
SHA1bdf9663796ba6e2e6927ef8ea970856585fa0be4
SHA2569fea7f274aace597b16b091e14cf9f88e883d36c54bfba100138f1a40436bcf2
SHA512712c750e7d30c20bc0daa747a7beb421f65661bcbadc8f6c1793a6ea962ee62c7b17c82f0ed08f70df9f632da04a8d0e88fcea7a72468050a859878602c79bcb
-
Filesize
9KB
MD565b4f4ea9608c30476471feb905c4ac1
SHA1239bb6aa0145f0ac172186cd0340285492395f78
SHA256d030665956e9772ed4fc7bc36055c4b343909377f398bf27ad597e0be9cf103d
SHA512f97e085828fe22a4337cb036d5063d4bab65024dabf7a0a8efd983fb7578351c2e7e2d0f2d71a8e99feede4a366a9e6e57501868a3d4a386742841d15c812f80
-
Filesize
11KB
MD538aa76bd594e29b67f1d2ccb4fac2f68
SHA14ece59afbbd581737a7e08229a0cb2ba52d73da1
SHA256d4c30a7b3e0de870b70d583889de2664f1e660d59794a84cbd2932454567b407
SHA5121daf527a4d62edd1be4c88fa05f878271b5499597927f8e47b9784422eda7c0b2433c128ec86d27094e5b1304af6057c6e5b4e1055234e438d1d0583c5c406e5
-
Filesize
10KB
MD5a13fdcc4877d30bb0fcc3214ffa5dec2
SHA17e9f10fbdef73ff5234be9163ba9bd85b35cc710
SHA2561978bcaa3065272d8fc0635ec7a160a99d29bd9762e7854f1142b943a27f016c
SHA51207b12100d6ac31336fa87ebd9b88a75df7cd68f6803dc07c5a4694ac2eb69573f9b28f28bd5af067883390e67c888dc5ff77591b8b49132c8ef201d5d65011f0
-
Filesize
10KB
MD5a607f5bca202dea0e782fef607069d97
SHA14db2f8dfc40085e47185aeca4302d230ad2b9ef7
SHA256abead5e5ec44cf9e49f87aedfc976dbf10ac22ccf2289316b7444e0819d6a63e
SHA512bbdf1804a409c0a8bf7812a971bfa712b7aba29e30f6d4f2589cdd580d46b78aeed0287307c0682834d656c66225a57d2a6fae3dd19476b40d8ee345e3825c7d
-
Filesize
10KB
MD588a32d9e7e1ebd8579e99c1e2fff67fe
SHA16e1b08a4a70b2ca7d370f48d3aec7b3f61506052
SHA2563a08819be5938b5b864b8563dfe11545e49932d76e9876acb089e014572c184f
SHA5120fc068437ae4dc5a63af869d3c36a4308bab47a8dd5032defe3736c95215db2fb3fdcc33f85c6236a92ae55d28f0151e0231b5e65fc72fde368c35a9608839bf
-
Filesize
9KB
MD5ed168d3dc36c4cefa9572dfbf6201c98
SHA1b66766e8397f39e62ac614b7beae663900db3cad
SHA256621e4536da1fb7a4fa80826be82b3b127a965a103e5507644b4f39cb24ae2a59
SHA512c50579b548a951bfeceac90fe02d6db1fd85a6b612fe69c1ddd26faaa45c65b259bdf2c035d0079ce32f91b8476d2aa41587fe5e2ed969cde9b05e37b3c12983
-
Filesize
10KB
MD55b450c5c1afd3dbd95708cfc8550b5d3
SHA19da26199732b143f99e481fe48b97129417b046a
SHA2562d300c825c624de206ae8850211b6373982a7dfc4dc2199cfb9e67e0a94db117
SHA512def7355968fbc8e87a152fd5bd56cbe9f39684364659c7aa1311af665321643a9b8da2ef923bd48ab6276ccfb11c981008acb6a594331518c20f9b9cdc8809b6
-
Filesize
11KB
MD5946437da557d0f76a973283083b50d2a
SHA15363cbdb0285f5288d9d60ff879163a9695f088b
SHA256800e6e20a3b5214e71bba8e6043d5da36a525f1df085d0e1900db23aecbd4205
SHA512521643b5fdc61d969877fd3736262e9fffdc116f2e0d9d8e7973ffc96656743efa1d0e05a0fafd48ec6b4f51acf23a6a1a1a8def9b2d239af74a0369ed995f1b
-
Filesize
11KB
MD5f3552ae090e69e6b4a44bf3ba49df5dd
SHA1127dc79b89e2cf20d4c13a31e84766c91c61cd89
SHA256af29e98b5c82603468a15f5513f18621fe6fcea1a93f0a5de3eb416ec439c41c
SHA512d0241a630dedd5472b0a7aaa4c479b41304fff3e779d84c59878de294192c6f6676e109974ab5e550e835e5e828187e59fcc2f29a15f7b49dee7f46686d3132a
-
Filesize
15KB
MD5feacac83ab463efe5f9ea51459b248e6
SHA1ea9a4767959ba527570966c3b7ceb1eb75c2a326
SHA256e545fd3a57c4bdd4aa8774bc1fb16ca4d16e4d92c346c5507e66dc60ad9c1e52
SHA5129f875508a54e5875da94b374d4e5c82af71ff08964e0ca592a081769d179850a17c2957df63b3b7882e495760d6bd5a16e32af8c21c3fd1275e25644b60110c8
-
Filesize
197KB
MD55439fa2a024aa634fc70e4f8ae1efd53
SHA1463a94bbdc0b681dd86ba449efbacb29ba60ea3a
SHA2565f3878541c4f56ae89633b03642f85bdee81590bed0a099d2ddeb693b4df8653
SHA512d4fbc057e08f53a6a753faff96c3c7241a14752fecefcb805ca627d94938fb02a1f6d284a052daf59648982a7c722c9be046ee0473bcbc2ce4b3891d9fdf62f3
-
Filesize
197KB
MD5e93497390c75dc451b2eb038f1852500
SHA1859f310b87b143eea2728e7c63a72cdb43f81331
SHA256e5a32e01588ee1acbc23e41008ef96e918f914956dd5f7b0a3fb9b03da7847bf
SHA5129a4d184a86de85d3f595896d045cd2c579c71a2828f27aa44f199074de913fb6b77ce439f9a2f343361c2c00cc4e142b38393f42c199e2b5c1721c88cb8c3a81
-
Filesize
197KB
MD565046c5fca9883d37d84036f548e6828
SHA1af7f334e59ead0e9a38d7cc4a815af77d80e159e
SHA256dc205c1be9bad0abe66ec5bb6558bad6aacb9d09c34cc55dbe49cacc3f370a56
SHA512af4877a00fa123d14cfd30b6c3bfc3961860ed932f2e58233dc31545eb88213b8f3e0f4adb443fafb324287c04c41a696d944e3b32b906c8ec75d0933683a56e
-
Filesize
87KB
MD5b95f972b9b33ef69ca3b9fb1b0adef5a
SHA1d8ad42fab3f36712b6205d6205ac0947615caec3
SHA256b1d1005b14deca1ed1e078758d7fc0dd9917748b46f71b0be16b44c57bd0088c
SHA5125448bcbca0acbc02b2cf12e81fadb1a0a1b5b27128a530a3620576b58a26926b8b07f814f2dbc60716321f883e75d08a3f606b14b8cae56e459065c7456b4def
-
Filesize
7KB
MD5f488f8cfc743d4c85fdd2e568f61ce2f
SHA161c9978bfd4e6ca0462be878fbd04b427a0218f4
SHA25603ec03f11548c1bae13af126e5f90fdfac51fae70b4749f80a76a433f0fef860
SHA5129057bdba20d925b565f38e338241c25d8d505de41771bac33194920abba2c7bacbd5ce913a43e49ceb29f7888232363219e833e1eee8b7cde8d863de0e8419f1