Analysis
-
max time kernel
224s -
max time network
222s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-08-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win11-20240802-en
General
-
Target
file.html
-
Size
312KB
-
MD5
61c66341826f84dc69acbc091636b27c
-
SHA1
6a4d91dafccbc78db785bdd851d91089f5f0c06b
-
SHA256
f5731424bd22e4dc80888795557c2cbc7883bf93df68b331ecbb9a9d0bb1a235
-
SHA512
3cf2969d0201afa08758265cbca7c521f5a6c2598f6c8626619d97adb182e01d3d6a04a1284b47812a0e442ca9b1e60a517b8797dfbc9f75915a3b84c423c482
-
SSDEEP
3072:RiYgAkHnjPIQ6KSfc/yHDPaW+LN7DxRLlzglKaVQ/k:/gAkHnjPIQBSfTjPCN7jBaVQ/k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
x86_64-w64-ranlib.exepid process 488 x86_64-w64-ranlib.exe -
Loads dropped DLL 1 IoCs
Processes:
x86_64-w64-ranlib.exepid process 488 x86_64-w64-ranlib.exe -
Drops file in System32 directory 2 IoCs
Processes:
chrome.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
x86_64-w64-ranlib.exedescription pid process target process PID 488 set thread context of 3292 488 x86_64-w64-ranlib.exe aspnet_regiis.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3988 3292 WerFault.exe aspnet_regiis.exe 2468 3292 WerFault.exe aspnet_regiis.exe 1708 3292 WerFault.exe aspnet_regiis.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
x86_64-w64-ranlib.exeaspnet_regiis.exeDllHost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x86_64-w64-ranlib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133693760796296424" chrome.exe -
Modifies registry class 9 IoCs
Processes:
explorer.execontrol.exechrome.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\fix.zip:Zone.Identifier chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 3296 explorer.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
chrome.exechrome.exetaskmgr.exepid process 2036 chrome.exe 2036 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 3296 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeCreatePagefilePrivilege 2036 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious use of SendNotifyMessage 46 IoCs
Processes:
chrome.exetaskmgr.exepid process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2036 wrote to memory of 1500 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 1500 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4068 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4836 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 4836 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe PID 2036 wrote to memory of 3896 2036 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9595fcc40,0x7ff9595fcc4c,0x7ff9595fcc582⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1760,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1748 /prefetch:22⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2960,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3544,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4428 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4432,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4480,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4700,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3092 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4364,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5464 /prefetch:82⤵
- NTFS ADS
PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5496,i,15600500187705583565,1896308775274869095,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4556 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4616
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3888
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\fix\" -ad -an -ai#7zMap28960:68:7zEvent52091⤵PID:4548
-
C:\Users\Admin\Downloads\fix\fix\x86_64-w64-ranlib.exe"C:\Users\Admin\Downloads\fix\fix\x86_64-w64-ranlib.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12523⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12363⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 12403⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3292 -ip 32921⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3292 -ip 32921⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3292 -ip 32921⤵PID:560
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools1⤵
- Modifies registry class
PID:4260
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1504
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:3296 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5002032ef86b63e0918832b475a2c3e76
SHA1a2f6e0542b8bd7a9964a082a8c95ec07abb3630e
SHA256b2e4d29196b60ef492cfb2468cc2aceb91314e33cfcdc3fdca696c23b453f621
SHA51243dca9f89fe685499717cf6ee5cc5f0a737be929034027907187c0dca272d6427c600f9e87b4cdd1f2c1b6747ce36388f11a8f9cf61f2c62bbb0ee0be6798097
-
Filesize
649B
MD5ca8b2c8062b6b9e92e45dbb226ee48c9
SHA1eb017593d6a41cf2fb97df1aa632a825f3d3b70e
SHA256923df6e92d60338e981c4a90cc3cc3f282d1270b29c916a2d6991b1b119c9456
SHA5127a7d2e39e4cb4c8d1e016ba1817475e7e40ba62acab573d0e0d9b3cc0b52547ef379b16166077aa0cd22ae2474fd2c4739665154eec27913af650ce3b10d6d49
-
Filesize
4KB
MD5b0c70f457dc99514892c518d126d7b60
SHA1367362f89c239c8a945aec4e87ba4c672d859228
SHA256964e2b5d0114e39178f05998a159903843c6816a53dd8fe455cf881ea4a75f2d
SHA51229b577bcaa00eaf67314ac0a08996abc105067e5c3641615a5e8a5efb037f960f4b1cc04de91d05f9adc00b283403281c8256ec14cb2d6de73580e619fb2c73d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5e99b1f07f5279c76127e268ec84d9295
SHA1693ab5db04d9314efb1c962cbb2aeb20f55e7153
SHA2567eca4b8e6fc411037675a0fdd4e35a38be0f0d2e6799e203548a0ee0948d4333
SHA51230e8170eef81ea716f954e7351f6d3ab465e5ea8007db5d459a679629eb4228d677b98d9a8dc2950699199fe544b6a390c8f73927b23caa6941e01659c254a7f
-
Filesize
10KB
MD5bd8b23aa68570201b04ff004392a4a80
SHA13c9ede086e47e01d8979251589e174ddc2368a2c
SHA2560d739a4c4528ac25878b09ea40668b37e43e8c504429248c8f72f4a5d8adbca5
SHA5129011bfb17585ec4adc0fccb7b1d85aa01c0d438cc7e726df5b4f47f52b6ddb4560db6a8f890452535c12d9c663aa65739d35a2b94ba5bd42e0644a8c71a30abc
-
Filesize
10KB
MD5be80504eca41d988b978bb807333efa3
SHA133d9d49eb0a2c1893c42235825c297021b7a9350
SHA25694d4a4985a5fb040487144ad2697218738a96ff23ddd56bfe123cc366c4f96b2
SHA512562614fb76833e03b8e1105fd1cb9249e7644105bd38c45cfbe9b5abbf2bac7627039187afedda972fdb8354e9ba0ea5f321e37f9ad077930ca4255b43104a5a
-
Filesize
10KB
MD5a50198e134f19cc4a3df244589751056
SHA1d7eba018407116806ef1d8d370bb8c14e9802538
SHA256b7532189ce6dd37f61abf2d0b5d8d36cc2eddd983dc0fb7f43279c7d813554ad
SHA512b1742557bb90639a8a3d731eac956a826fed94ac9e66abcc465accaa2e54dea9f9b3aa31a50eda81187392023d348d94261820d2b9ecfff05a355c30beb0772f
-
Filesize
10KB
MD5b4ccb3318b139cb3a0e0ea97578b30ef
SHA14beee45f9d897c76de8c17a561b3eb4501df2192
SHA256bdb025e592f1478a59b1983ea552b5f5f6a5343398a96fef15867addab10b3d0
SHA512de4d4c9fdacc0aeb0ddd44bdb23d8befd2ec896c9721c372673675a3f3b198d7f129c276a383224cde87d2dc954359882f333dec182b54c85ad8e59336787751
-
Filesize
10KB
MD59849725ceec5fb9df14ddebf52ee8f13
SHA1ab08b75245890cba50acb411f39cd1ed50848eab
SHA256ebcc4675fd0c31e1b302d44d57237f9465abc1f6188ec0ade118193a452a421c
SHA512f9ce3d0a376f075134520d881ffabf6d1c18e195b5026382766fc2ca6c7d67a93b279b87bb474c0f5467edfe8ed5cf35a5e487cc12127f576b6f337e0fbf6bf5
-
Filesize
10KB
MD5cfce3c12f506dea96d16fc295e075b19
SHA18fee77305dfdb6dc19f13bdfd9ed370c17015d17
SHA25604dd8f4a611b61def721c25efa5350283a3bf8f12d79e02c38bd745896540ea8
SHA51233da182df3c13ff9d84655382d65b7f07f4607a091e20ff083df4818fc712fa2788e7fbf1a00d265b5c580b3781b176949f5c6a3a4e1390e314eaac3f9b299de
-
Filesize
10KB
MD574bbd7d4e83dee64568ee2c8a9528a6c
SHA14294a8c721915c77d08cb59506479f20785588b8
SHA25677bf21833de5bb6b74cbb08770a113764616ef663d2f79d8ed527e164ed551d3
SHA51281620ad64df57cb2742029f11b5530a44716d2000be504f97af804c0dc36d9dbe87723f7444115a2d8479e31c6d8554f80064f67e852c1c48b44bdc9df704ad2
-
Filesize
10KB
MD5c56f1c549d9341b6fd42dba1fd7b8410
SHA1ef5238e23c463dd1eee773ad1f54464349fc2b6a
SHA2563c86e235fa8030806f2e9dd86e5672352c61a5d9b9cc33c64ec5e4224f2a8260
SHA512921e16b40ed412f53de839b6dff8ceaf169d86657dfe11b7f55284bac6d2e58b6c57347282e54eaf5006818a5c0bb5b8ac362a56871c8009082f875fb41fe0d7
-
Filesize
9KB
MD52ee83ceece3118485ed8c5a67a4df50f
SHA1ce0e6ae246c542ff505d0a07b0d11adb8fb0b939
SHA2565af7e20f5b6422a681fe4a19ad2df4a5d8574736421244b39dfa0b6037579e12
SHA5129d1907d409914e02fdc8cf63a98a070188541f9fcacd426dc96b428c9c617870b2c5ab9deb0786f06d72009d4661a605ec9aa7edf9679b6dfcf3cff12b90f0dc
-
Filesize
9KB
MD568d3cfb6d2e9d4fad44f0720ad7883b9
SHA1fd6ed22ffcc2f2b055170fce722eeb3634b5e6e4
SHA256b47e63d72c59da895a022760861230e04b4a496c6e3385f988b54570f7507722
SHA512c93819b0c37680332da71ed4d892b00fc86dcd91031e854e6775e59d70e7c47859682ed531fbab423eac613e9ed9d3213d51833bc74b82b779e4fe987d411e9f
-
Filesize
10KB
MD52d2ec5955f1b1a3327503db1165d36b3
SHA1caf131bf40d29e3c3e217df9e91e6c034c0b1b0f
SHA25691997a7ad69847b29cff45dbba322123c3d7af3f006d61ac3ae2932769c6f016
SHA51201c105b0f39908e9281c21afdb0e12a30f8a9cc2270e773c68440b327ab1b51616466f844417b5a44d05ab0e6ea12f17d9158d02b9125b656e74cf2144587df9
-
Filesize
10KB
MD51ae8ec4d54355869ae82d3b99dc5b953
SHA1a6f2d41db49299d15a3be6a608fdd7c9ded499e5
SHA2566c5e76247833bb884f2e61ec6710cb0537eaad2feb00892361f0e45fae9bd57e
SHA5128553684a87ea1873006077b6508f299f6a98d8139ae7f5d551faeacdba9cf80032056852a6c15f95b372e52789088bf3b0f9311e115c5f443c907a38f009d571
-
Filesize
10KB
MD5d55509b7edf401c77ef724d077d04832
SHA158838cbb89ed578e99bb0d02d6624d867ddb4379
SHA256d00f801859b3c10990b9f0a3ba976364a0588d02d293e91ec38596152802c678
SHA5124993763f35701ab0366733c9bc74ff496e200975b3162365272a6c03be6ae4021efefa20e76fccec27e13fe587ded78a666c6cb57a02483fc0ee872e2c6d2661
-
Filesize
10KB
MD5cc45cad7889cb0ec43c3ea31bb9a3c02
SHA1d819d8ceefa0a63a3e467361dd7489875673a2bd
SHA25642ec6b86efa3e7695899eaa23941d9aefcb007ca7a773504961c0f7d3a18ccb5
SHA512fcf7c89f8c3280627528ebc78aebf4d293c37c65c9cf14aa83be35d0bba8e25af7508262ba072df4066c26d31c0af7a06a7d6137193f9fbcfe269a26a37fa87e
-
Filesize
10KB
MD54f426827aed63fedbbf7d554e3098da9
SHA1bed8e52296fb42644232315a53d0ba2c7149b3bf
SHA2560d80423a0d09b0d85fb953fad707200f0a0d9bb06ed65cf99a27529abdd35b7b
SHA512481ef247362ef8918e8fb05c2a2bd22847041537740cc1b559e33d8367d9d3fa2929f65bc02a62e9e781a11c6f7558a6d0ad95795ae80bc2a1722f9536953852
-
Filesize
99KB
MD5996bba9ad3911ab111789cf462a7e80b
SHA132972f6bf74098fc211ccaf10a30cbc28c57669c
SHA2566449b7cb50789b76f54c5f1c85dc1e027e4feacd8a9edc5849d1d81476fb41da
SHA5126a20d74dc0658605198b376c161def67ea14bd79c8e8c7843f552ebd95439a79e58c205f05be9aadc73064a8a04e734210ee48298923f14f7eb2dd05479445bd
-
Filesize
99KB
MD595c1fb672e5ef5cb32b587df436c30fd
SHA1a00eb270fa009745c057b4787feb62d89cc01947
SHA2560ccc86879d74a68d0900a9e88c6b90c9eae7412f56a3e5a7a6b73bdae9809898
SHA51265961a5526911a73c6ab5781e78f6da48397d0a2df45030d75ae89e6142ab8defd76edaa04b2e97e924c1b0676a17bfe32d8d2a1703dc7512518029a447ce3b0
-
Filesize
518KB
MD55f35377dd8abd7bfcfe3b3e37f26006d
SHA1c8bc44fdb44c410dfb30dce977cea0ed6f0f83b8
SHA256e362c6d993b8894318d752652b93e2379a5fccfe35ad96f8c420ee99465601aa
SHA512058d661d5dacf5df28c1023fea229426b1807bbae3d5c13a65d45543e457d0a411589e77f0b2d6824a3d75d2bd0d4f1a263d63187c0f395af3e78dd49a999089
-
Filesize
518KB
MD5eddbe3435bb776aeb8eee7f7ab709d81
SHA176918bf104460e42dc1437b0cf5198ec5179518f
SHA25657df4fa9b5259777e61028b8d333c64cb8d70267f139f6b782cc92e33cf4e92b
SHA512c150f5b24b1a4a20fb80adb58da2716206621151eb36cc84844cc398d6d285da02e804e41568eb97f79147de83823a695b4116942537c3d55701cad540aedd3f
-
Filesize
49.5MB
MD54b6c49c321c57a1608bb5ad847093b47
SHA1e64ef0a68feba1b26bc37c7a31db1b3fe679ac3d
SHA25603f6f9919e1a4813ba16336b2397cc90c43769e7347745cfd832c90cb2af958f
SHA5125b70c9adbbe50c75612c6ecb3966b2a9f431e1b6fdf3471fc1f2a995ca76d96255673c70eef3850731853a491fddec09e1bce0cc0ba127444782a9ccee5311a5
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
271KB
MD5ceeaf311814a69cdb43ef2471c841ca5
SHA108332eb2fc473ced76233790399a963470233579
SHA25619d359536eb1364d6d36c9d38c98b1aeb5888d016c655c2fec55dc447992ee33
SHA512216301f28dd70d10064a41379881d50d6fad67844b4bfe977f775e54b90972b978e3eba89c5345260dc21195e7f9d6da7f7e1da9b89575236536e87335c0053c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e