Analysis
-
max time kernel
210s -
max time network
208s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-08-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win11-20240802-en
General
-
Target
file.html
-
Size
312KB
-
MD5
61c66341826f84dc69acbc091636b27c
-
SHA1
6a4d91dafccbc78db785bdd851d91089f5f0c06b
-
SHA256
f5731424bd22e4dc80888795557c2cbc7883bf93df68b331ecbb9a9d0bb1a235
-
SHA512
3cf2969d0201afa08758265cbca7c521f5a6c2598f6c8626619d97adb182e01d3d6a04a1284b47812a0e442ca9b1e60a517b8797dfbc9f75915a3b84c423c482
-
SSDEEP
3072:RiYgAkHnjPIQ6KSfc/yHDPaW+LN7DxRLlzglKaVQ/k:/gAkHnjPIQBSfTjPCN7jBaVQ/k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
x86_64-w64-ranlib.exepid process 1324 x86_64-w64-ranlib.exe -
Loads dropped DLL 1 IoCs
Processes:
x86_64-w64-ranlib.exepid process 1324 x86_64-w64-ranlib.exe -
Drops file in System32 directory 2 IoCs
Processes:
chrome.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
x86_64-w64-ranlib.exedescription pid process target process PID 1324 set thread context of 2904 1324 x86_64-w64-ranlib.exe aspnet_regiis.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2512 2904 WerFault.exe aspnet_regiis.exe 984 2904 WerFault.exe aspnet_regiis.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
x86_64-w64-ranlib.exeaspnet_regiis.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x86_64-w64-ranlib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133693757827933767" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\fix.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 5044 chrome.exe 5044 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5044 wrote to memory of 2228 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 2228 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3592 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 4872 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 4872 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe PID 5044 wrote to memory of 3860 5044 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fb05cc40,0x7ff9fb05cc4c,0x7ff9fb05cc582⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3040,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4336,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4236,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4744,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4896,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5200,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4320 /prefetch:82⤵
- NTFS ADS
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4252,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3692 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5084,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3240,i,6878981391485501480,2408370747151055390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2100
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:932
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\fix\" -ad -an -ai#7zMap18389:68:7zEvent283251⤵PID:4460
-
C:\Users\Admin\Downloads\fix\fix\x86_64-w64-ranlib.exe"C:\Users\Admin\Downloads\fix\fix\x86_64-w64-ranlib.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 12283⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 12403⤵
- Program crash
PID:984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2904 -ip 29041⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2904 -ip 29041⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5355a34426afd246dae98ee75b90b79c2
SHA13011156636ac09b2665b8521d662f391c906e912
SHA256f073bb41e3fb1650fdaa5ab3a2fe7f3db91f53b9457d65d58eb29bcc853d58e0
SHA512e848fd8ff071e49f584c9cf27c4c6b3bddc522e18ce636fce5802fcc1da8c36c90d331ae5097b60e795f0f967141b2c4293d39632e10334cba3fdc0f9cd1bc34
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\223f771f-dfb7-4cbe-8d60-de711daf3f77.tmp
Filesize8KB
MD529e56e8cc9827c2ea48daeaf7444f410
SHA1d62aed3ade193d74527aac6c544a4b40e79dcce0
SHA256f27064dbf216e5c08e315e3726644885bb7942ee00c2ab1d9076f8768f08c0b8
SHA512665f1cbfa60c3104e2d2a679bb6e238e0b10bef8a28935a3fdbdb547032981460c1282cd9b8a7fc2718ba96f49788023585116d70e549ba72cca0826cfdd2fd2
-
Filesize
649B
MD59083267fc2983dfa538f2c56329fb38a
SHA18c3628ffbf0158f1744508f4d295743067d951af
SHA2565e1258afac3b2df1a4157d01bc53baaa11ae48a7aff56fd30307becd9a621fe8
SHA5128d0b13b9bf6125c3c0fbe59b928ce82adcb69298d168a8e58dcd539501d3d3d126d357be4f6c471ede10070404d587e772eda0792cc7c7e45c90210f90c0c4ed
-
Filesize
576B
MD56eb80118d0afc7589982587a67bb51b0
SHA177a0330d2fbafe38ff49037f697584e82ce443f7
SHA2563aac83c745db5947281bf124bc5fe5ab91c98a4e137ca710767c1c3e86374952
SHA512f1b9ff6505e689bb40128a6d46e2a1038e47817e3827329dd7e80ff193feae9615f43dfb96f156a263485c2a90bc31a51041adf3a3cb0313618a94cf9f47316f
-
Filesize
7KB
MD5ac14ff460aca77209958b5ee4b23e2da
SHA1ac883da3101b5d22a5deb628cf8f372bd8b64aad
SHA2565fa3ccae1d997985fa8bef11739e363ddb89c346378b3115bf3c004a8352de68
SHA512538539e3bf6139ab23de86ad1194b593c3588e5d73de52e1d72b701e6a88fdc4832124775307cc5f9822252f07df8ae539122e2c49f426243db31bdc8a0a0487
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5cbee0f8ea28685eea083ea82dab96ed0
SHA1b868a1f4d3f90761ed2ebfd16790ee0c3d355360
SHA256ff58edf6db5258c99e71791c23ae7e3ceaa03fe902d8e851ef85cb07f17d1c75
SHA5125b717585632bf7b49d681b3e35a5e157b1f3ce63cb79b00203f2426ce305bc00b5241547e040c4d5ce56e4d02935bd9e5a1c01020cfa9544e353d8526c5adfc3
-
Filesize
858B
MD5c00fd4e02b5d69b034e8e3a1849f8f8d
SHA1b80fd0593f2e4ada3f7e44d3fc4fe4def63aae94
SHA2564ac9c10a13f6c01538e1f7aed514dfe5e5a4228f9fe3dcf69568cac45fc0eb77
SHA512044f763cd73f7d76e30134192e0e5fe0c75c19a9e14b69ffb6ed66562065615ea68fb640db236f7681339725ce7f79b11b3f54c86278c74bcb0997113e4dcd55
-
Filesize
1KB
MD588283b815db0bd5d35a3f78493f755bd
SHA15cb293d3f9fdfd7faf45f0e14cc59f21eb212c13
SHA256cc2a8d4c2279b945d945460883c31f2ab1dc17b75234b0e71f2886e3f91a3432
SHA512bdda47b6dc62ea1183b13f51a387b6d9a32859f07441a70195b9bd625c5bc8c3cfe16333a013a236726d4a1a54b749b56c87ba545b47538d8410189cb91e3f64
-
Filesize
10KB
MD55220766c4c43f984ce8add88f6413756
SHA1fae69c47cb0a96deb8632b87ae6ac9f7c8c184f2
SHA2564b11207711b430cf24a9d89c8d97487b0bb34e4fc9054b88894b9c5c29939692
SHA512c18a662fa07377d6805e23b2f25cce5c749f862d5b94fea57132abf53d69fec7ab7f8774e5547058315603233a848c9697ae8df03010eb7f3e8e64e3b6a629ee
-
Filesize
10KB
MD55f01949e8456b2b7c5acc2bc39ffc1dd
SHA156c007bb5c905032f1aa16bd61c5594d4af593fa
SHA25689a3379a735d43e128be147c6b598237ead1c5cb55b0c7ff1d9702e8f106fc00
SHA5128d05f4ad7b3fcbc9a3eab263dbd4be9055e01fa6001dc53ea4486ab2a7502dd03c3d3d614f189c9a8b50917f94eb3f989d8a752097ad794a0b68dd22a70d4dbc
-
Filesize
10KB
MD54326e001cc467933475888264252e909
SHA14fc29e121d8ee86d94dfe3d13d0234eddc40fe85
SHA2568d9c567d0e470b56076c9e9f092aa6dbef2c527be84b34d2df1a534f3352307e
SHA512fd8eab9e2be872ff43135e4d958918c15583642c17e6437d0b370cdb6a265264176b3ec978a402bceff6a52af5443fa59d7cbbcb0c93d83aef5219a645516aba
-
Filesize
10KB
MD54c433d71afadffc63fdaacc37fef64e4
SHA166eca4718bfb97ac225ec73922d232a6a97b4c8a
SHA2561ac35482b573f1fea72d7068fe6900f8a21b6a6d0891ddd54ed85341b281e86a
SHA512820588543fd90568309af8b8fdfe6747d228819c39569de11c7f5418319b25eee98cb90e58193ef3f32be2067cfee3c9281e4e85529e1d34db6a76d0f1364416
-
Filesize
10KB
MD51c45c0f4474c2b1706b0919f704cbe9b
SHA1baee9a8a23c1c8cf70e5c65d58978574dd2df29b
SHA2568a8322ff3b3b847fbd247b4d16539904c54bbbe087b10ec747c6988fc2b8a22b
SHA512f2133e2ad5001cdbb999b3667611a4b781789bbd4b7990b47a1cf7e44bfb6e5a8f830ed82633d03e9ba5274324770d23c6c0c4334efb51a81aa93eef01360fe3
-
Filesize
10KB
MD52d9205c051bd3b71bf5182fb93fd8094
SHA19a657433fd85f82aeb5aa734fc91bfd7b9a848d9
SHA25613f28a84298ccfda42abfbe4c209899c59d4177150a95098ffaf0e9f7d4d9259
SHA512c6c920ed0ee97d7a225648e49fb4d7e328e6957533b43ebe3a899ddfebf9de7a26cbc0324a3dec5de2bfa7d0ee4072710213a309fbb892adb5e167b008f53b82
-
Filesize
10KB
MD578016c3f2c8ca46b03452f6625fac019
SHA15957637d1e3714e5ea28e12d5b1d59263dd8aba1
SHA256a69f5b69732f5ae1161ebf67c053a8a651f1987a729d87a96da5bcb18307f413
SHA5128acfcb8248d3fd74d015caec71f8ace1593b2c4ebc0b21ef5ec8ee49b001714756bd1c573c1cf786caef15e41754483585be65aba9eab58d954faf8e38e85ff4
-
Filesize
10KB
MD5190b3ad3934b1ad25e301815ad5f88d0
SHA1c4d4c5068d2a95f25a08e914af50fe77e03df3a5
SHA256edc3856e1b0300139d73cd887f5d3ec67e976baea06a77d1429a2db410fba03e
SHA512b295177ef6eaca501c9a8824bcfcd8650789387a14ee0fbcb3527d8804721aea37b139a8abbf965fdc836ca59a80f8932c5bd7fa100cd528c81b9aed87fef401
-
Filesize
10KB
MD5a78af25a46f81743a97b1d312d05b43c
SHA1b7dcd9eb13c844fd552089525ba3ffdd267873a3
SHA25674ae0dbf0eec6ab39ad266c7fe49139b254d4c95e6e2e1acca350613e8fc9972
SHA5121500eaa26b9a26b0550e318948885a1a891808b8fec2d8c3968f364331572a30cde70db8948469286508602c865cf9cf838cd7f86b1ac6735a30132cb12fafc9
-
Filesize
10KB
MD50ece77e29b0eef10309c4e08ca3ed55b
SHA1488412adc03ed7bc3ffb0557a1123efbaf6e71b6
SHA256e2c0b19fdfc73254bb3752e726ca33a323d539a46123d4ae1ab69925383df7ce
SHA512f7161a9331430ae0de2c7b598addc810757b723d2c3baf77fbe7289ee619f066f4a8b989f2ad27b1e782c76389b121a40949c4d4b604a4662ee970e984b75d86
-
Filesize
10KB
MD51a5fc27016abbff390f489a9f8a503ec
SHA12ea75df5b7e0d56e0ceaebbffbb2c1265ac6799d
SHA25628fa1559118a7effc627c0c50c45561b85a7c3e8b6ae25103b55b3e216fc8d08
SHA512101ef218f9835f4b4119faa202691c047a789b1a851aaf9c0552ffe6df958ca502b8f1f13588ffcd9dc3759ee86080f79483956c468c7bc3d669d1ce180940c4
-
Filesize
10KB
MD5516f50e1df60e44142f72d29d4d955ad
SHA18b8f480c95c21dcdb212eff8c79c7b4cd1fa9768
SHA2560818ed1cc9754b3c4b1d9975edf7c9c0fc56033d0c9ad9d17eb4c837a71bf64c
SHA5126bec4af1e38ab66b5aa404f3cb53d522764e6a907516f5953eabfe96b4da61358f5dbd9909e303f27c0c20bcfb611338dcdec81c314bc9d1abffd31910430c12
-
Filesize
10KB
MD5e289f8b563fe7df707da717ef4a62246
SHA18b067d40c45e22ba6e2a92961abdcb916364ac7c
SHA2563cce0fdfac9d6d3487b5836b46acb56092c029b52b982b26a14afd880a621e8f
SHA51249f5f8c5913daae1b5fbd3670b82e8945eadb24c893e52c0dc11c7fcfa17fde123b5bbc705232c43b93934c54be480d238b9dea8ce7d5e177ae1bc8b9aa79efc
-
Filesize
99KB
MD5a9b570f21ab25ec0cd11b71b411ed8e3
SHA1e6c3ba2322d094ee13265a936797aa5ef21babc8
SHA25696757adbaa51b10e424b6a9964283699ee9c337d027b731091f3d7f623383e3c
SHA51207e4510aef106da40daa704a3e9914bfec913589f5eedde9c5d7048a050fafb565da43ce94e344628abdfbeca6f7ed2ee7d3252802831e4866704f351d0fa353
-
Filesize
99KB
MD53a4a9858db80c82c1e24cbe51ed4f083
SHA16cd844033056810bdfafc29ffe8dba0a97186b42
SHA256e4ba0b63e925cf33b3c3a7f3cb831617081160f7717d2ebbeb974266a5495c9e
SHA512c9e942e098f311ade7e55f00d97802ffa07b4153df2428bc4bcac99bd0ee50fd91390161d89749e4652d7c6774efb09b4790845285da74cf8d07eff757914fb2
-
Filesize
99KB
MD5370f46f71e4a1dab18d925b823761a46
SHA175a2636120f0c059e417beaed2f729254d9328be
SHA25618ec97fbdc6b6febee6e590d06bba613bfbd3a81468987cd23d75a550df3dc01
SHA512da63fc3fa65ceaa60f39eeda227111cc91021f2bf4af497650e76ff1705b7347c8a4e8e2f9626196d3fefc0bebf0245b147ef41a8d791136e4450333287a3d87
-
Filesize
99KB
MD5b2559e2084d08bff0d23308aac855168
SHA161c210b052462203e1efc933bf74f53519917aed
SHA256b90e3f1f60750c565199130f67f626b482ac85ad605e6098f734c7dee1aacecf
SHA512be034716bec4dbb6a6baa5adc2aebac6127c7f9bb60445acef0b48c6358a31d043b0c4e465ed3c731cfb1e7413b2cc8ad2087d51c93687ade2c9b29fefbc77da
-
Filesize
518KB
MD5eddbe3435bb776aeb8eee7f7ab709d81
SHA176918bf104460e42dc1437b0cf5198ec5179518f
SHA25657df4fa9b5259777e61028b8d333c64cb8d70267f139f6b782cc92e33cf4e92b
SHA512c150f5b24b1a4a20fb80adb58da2716206621151eb36cc84844cc398d6d285da02e804e41568eb97f79147de83823a695b4116942537c3d55701cad540aedd3f
-
Filesize
49.5MB
MD54b6c49c321c57a1608bb5ad847093b47
SHA1e64ef0a68feba1b26bc37c7a31db1b3fe679ac3d
SHA25603f6f9919e1a4813ba16336b2397cc90c43769e7347745cfd832c90cb2af958f
SHA5125b70c9adbbe50c75612c6ecb3966b2a9f431e1b6fdf3471fc1f2a995ca76d96255673c70eef3850731853a491fddec09e1bce0cc0ba127444782a9ccee5311a5
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
518KB
MD55f35377dd8abd7bfcfe3b3e37f26006d
SHA1c8bc44fdb44c410dfb30dce977cea0ed6f0f83b8
SHA256e362c6d993b8894318d752652b93e2379a5fccfe35ad96f8c420ee99465601aa
SHA512058d661d5dacf5df28c1023fea229426b1807bbae3d5c13a65d45543e457d0a411589e77f0b2d6824a3d75d2bd0d4f1a263d63187c0f395af3e78dd49a999089
-
Filesize
271KB
MD5ceeaf311814a69cdb43ef2471c841ca5
SHA108332eb2fc473ced76233790399a963470233579
SHA25619d359536eb1364d6d36c9d38c98b1aeb5888d016c655c2fec55dc447992ee33
SHA512216301f28dd70d10064a41379881d50d6fad67844b4bfe977f775e54b90972b978e3eba89c5345260dc21195e7f9d6da7f7e1da9b89575236536e87335c0053c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e