Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/09/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
[Kimochi] HLC-0.56-android.apk
Resource
win11-20240802-en
General
-
Target
[Kimochi] HLC-0.56-android.apk
-
Size
261.0MB
-
MD5
a57ab243f3ee0a022ca63c914fd18702
-
SHA1
3776f7e54d3586a0847075a52fe3425edf8c7958
-
SHA256
6289f6ec028c82b4344083a8e3d217c23f330e4a517440662b1ad0ed081ca598
-
SHA512
eb4adc10b7692051a0c7cf900375f94acfb27e5741e6836b36fe2dc5f8d30d028772722582393b2e7341bc32f4619a5a04963d7410c34fbaa0ffdef7b525be97
-
SSDEEP
3145728:a4Y+Mk6SM4Ah2069mQpwKSu0I+wUCIsMAdeYubPWSqOJRY96tu2cyt6LIhskpGJ3:aDkSP8PmQ+5XjCXMLYuznqCtI0skM5RZ
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133707667720320393" chrome.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\apk_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\.apk OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\apk_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\.apk\ = "apk_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\apk_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\apk_auto_file\shell\Read OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe Token: SeShutdownPrivilege 4080 chrome.exe Token: SeCreatePagefilePrivilege 4080 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 1868 OpenWith.exe 4336 MiniSearchHost.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 1392 OpenWith.exe 240 AcroRd32.exe 240 AcroRd32.exe 240 AcroRd32.exe 240 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4776 4080 chrome.exe 87 PID 4080 wrote to memory of 4776 4080 chrome.exe 87 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1316 4080 chrome.exe 88 PID 4080 wrote to memory of 1804 4080 chrome.exe 89 PID 4080 wrote to memory of 1804 4080 chrome.exe 89 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90 PID 4080 wrote to memory of 1596 4080 chrome.exe 90
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\[Kimochi] HLC-0.56-android.apk"1⤵
- Modifies registry class
PID:2992
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e449cc40,0x7ff9e449cc4c,0x7ff9e449cc582⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1844 /prefetch:22⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2204 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3324,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4764,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=212,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4720 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4564,i,11926722468413905878,9701025214720035040,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4184
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4988
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4336
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1392 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\[Kimochi] HLC-0.56-android.apk"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:240 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:4296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=74A2125AA8990AFCC8EDD641E79AD1B5 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3564
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=29A2C258D4BA904D3F07163EC587E2F5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=29A2C258D4BA904D3F07163EC587E2F5 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4574B8DEB8AE793BA5837BFDBBE82AEC --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E3A115C0ABB8A4285A05FA402FA54A03 --mojo-platform-channel-handle=1972 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=029F6FB7F7424C31C64E620CAACEC3CC --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD531dec59554a998dced49c79acca0f943
SHA17f42fd583213f851eea5f5e25ee7928ef966da09
SHA256578e0d7ab8ea182d9d27deb19c7dee7390668e9fd768d5608df646ca89835543
SHA5129511d573ec17fe478f23f0a3aeca2228c3ba4d4b5d83ff25fc3f7fc3121dd98a35d6a3af2b9ebbe947ed93441c28eb4083377b4349a7ba062d195ad5514b047c
-
Filesize
1KB
MD50bd417cf611264821f1e943c8579dee0
SHA18c828eacabc4ac34bebcfe9b3a9934aeeec69d54
SHA25636bc5aa24b9702d441931fdd1902b5884cc0804df0b5dacc7eddaaec606c88ff
SHA512c5780c9b23a2ba304d52e9be3fcd7017fbece5636acb04b158b668df5d331ef99416ce09859f20e107e929b8517f4984b47a76df2836fe8658b439fe3d1afd74
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5049a5714a53727b210aad83c0f3df11c
SHA1e3a6b28cb8401a39b7b8f285e7eca052f6ac731d
SHA256fe31a890cf007f3f6ef9c396488a3c6ebfa9fc507364477620dec339ba6ed63b
SHA512699e5f21b5105cfe5f69251a2e4c6b6448d8e3e7e796745f594997734e5dc3abe5edd970d9ddd355d1f10c7c706a5a266089301fcc38fade4b8f88a456f5f659
-
Filesize
9KB
MD55effdd8a6c7668aaf467935fd5cae032
SHA101722d61b0e98388077dfb0f2a8a1ac36f1a8270
SHA256864af022b0e491393333b99f7cd94923ff3192e6740906e637fc3f247e04c9dd
SHA5127432f0bba782086ba1360421fe919909e58ba78df3f13a20b3078af62479d9325ae897092351e1c8d4c53450a609163ef0e29fa6df0ea5ea296f279f44bd7285
-
Filesize
9KB
MD51ebc0913a3a6543d3bbd463c12c85af8
SHA127608883f0db088cd23f419dc6894cd694be2e20
SHA2563af58050caac16f488b6399a41318e28d0ea0504687600e9bda3c25d236f27eb
SHA5122d02d44cd97ac655c0931eecb396e31c215d8a92feb412cc196e78937a123ba7321feade4345540421626b707fa2dd7d10fea999843251d4f46e74baa597e9f2
-
Filesize
9KB
MD508a9c47c3c584fe086c41caacbcf6d75
SHA1e3b234ff8d0bae1f8ec7e29652badbd27426a2b2
SHA2569294763dd8f13b67031a97fea89e5c7d458a296c55ed05021be48a1c95f78f01
SHA51200b5e7f1d666ba86bb3d6ec690fd3714225141de68ea86ed4b526c816e8e699ef3207800ab51beb74c5c5f249d77e006627d3d5a3ca79f9fc0d691c1841fd30f
-
Filesize
9KB
MD5f0b0ade87f983c3ddcef6deda5139cb5
SHA19df7850320716a109bd7f5dbf6d9bff4c43e8d17
SHA25616bf2b527ddb75aa46cb6c43e8b7eea156d388e9c8224c2e3645ce34aa7fa9c5
SHA51218b241831b17fa13ec0ecc2802347c800370aa029b76f0d6b83174a0b9f75f33a9db0db6d3882563f332e0413fbbdb127c965d1f162a121f76d29813ce8e0cdb
-
Filesize
9KB
MD5014c4e31c26f800ac5431f8293e62c94
SHA1ad10a126d207bf16b239eed5c37bdd8604acd95f
SHA25659186a210d65d647df834dd866353c227a9b7c98b4e320d36e4ad80151f7ee33
SHA5125716c4d62119baf3709f611616ab1ecb45c3e21ac7371bfb98d190bb188173dd4e977d9fb77afbebaa6686a86b63cf5563f7871a189f1b8b3bb112cc23ad5cef
-
Filesize
9KB
MD5f33af3d2dbb727bfa0f6513f1b0cd38f
SHA1fb628d87f0128b47dce36173de6be08e2c57f41e
SHA256d846ef3925913821366dc8fea88320bc4ac10e17fbf5a0c85fed4a8a0641f333
SHA5128a74f7492294baa117f19dc892a079efa923ef25450c4890737ff760847012f0f3d549ba3f27aa85555ac57034969d112bbe077dffde264c2c09309cdd1608e1
-
Filesize
9KB
MD5c80c6ae098b8c5eeb3545bc9788f5595
SHA16c0a2b21a22b0aa2b650fe17fa1c9cbee76b8d5c
SHA2568b3296d5fef05da9da890f9584a02208e73b5b80878882c829d58de68981460d
SHA512d33f9199772a43dc3f7c76210f893096d471be0f40c811dad71429e171b93f7c46a0e9d5abf536c13b65aaab20b4e1a1e2258df67d8566c35fa86847da224507
-
Filesize
15KB
MD591c4317a47c36fc8aab10feedf2ade08
SHA15d5cc8ea2e35ba4fb82efd4704c94b212f6121c6
SHA25612a53068b36c33912fc97b15b4072ec01ca1a27d598663b7e5c90888a4ee2a7b
SHA5121f384e093649f92500a3f2d0a68b2486fde00fb73fd324810f0551e90566324dad7848658452dde12c4c2bec701df2b4038cace5f47b1da7718cf0df21a0ab42
-
Filesize
264KB
MD51b010e361d6b59620433966ce86970e3
SHA1fff1b7c40dce64483ea3fdc8129191e0577e005f
SHA25607861918bdde57fd6a4b146688b6699e07249bacf086f8ca5cee4fb534e85007
SHA512112a2215e32adf177129276a1f47feb7546e42a7641a13e74cb3ea201b1b7ca7c965d06935dc2b38cda251d8d1a7a81f3471707e75f4333afeee885237e3522b
-
Filesize
101KB
MD5d2a7dbf120ec7f3b3ca16648747675e7
SHA1223e0ba137d7d1b10e3a9e5ba85f0cbee0d59354
SHA25624d9775bca31868fc9d3ef92edfad1c4fd5838c7e0d9c95e2fa2a89e441dd76c
SHA512aa906d3dc645e9fb63c852353a94e4737a802b26af08e796007d119e7ae8b43d66dc7eae322d70ffe731a6e7d978bc0f50b5142fc39f2df3a91f436b4b430baa
-
Filesize
242KB
MD54a5c42292205251fa8e218ab332d97c6
SHA1af91f37c3d1295b53ae5a6e68ee3f1679e150c40
SHA256dadbe482b9f5e0c7ce9c7cb834497b4b6e3ad6c38192dc3987570040a2075573
SHA512a7a432e9c0f7da377c5b0c09344d4693b2ea66af17fdc9b3ec6d712bd37d5c81fd5683e99ca41da3818b9e7344237d6aed925d543dc99658021932f62da5cf0f
-
Filesize
210KB
MD5e53c51345baa437c8d68fa420828b6d6
SHA1a853f06219fc7c3f3f39ab6c8c6028432baf601c
SHA2565764ecb15fc9697904c4b220a1b5c5b129413f54d7c1e4804d824bc176c52e01
SHA51249d7070f54be921c8b5557fe2ce38c5b4f9409c5bf2e91cbaafcef6ab52b8ee5acd4d5a75c085fa11f2cf5a855625060236b2e35197f2226e40b7400b83e55f7
-
Filesize
210KB
MD578c26179ea7b0382c367a7de9ec8db92
SHA1c8005f67a43aa14cb29cd34f138155269dd9ca45
SHA256c0b8f71257da08b3011f9d3566d13a6b1540e0773c36d2ba3b2c2c60d5bbcc1d
SHA51274c8f684993b9247f5be7e710bfd1db5ea8d1659fefbf3f6cb26c56b6b7cebfa16ff8afb90d5fea8875a8d859b7c28a77f5033099030eb75d9e172a4edf944e2
-
Filesize
210KB
MD5d3dc8f55ac4768bb56689463a4807b88
SHA1628a8b745fb64c10b515a4946dabd9a313ee5fe2
SHA25656f560ae49940ebe08aaed0b63f176a5a7ff8e8ca7013a1da7dfd1a1dea4d06a
SHA5122be0fa604df0a97918a81ea2b4e57d4f5d788ff4f9286f5e53cc10715a77874c4699586051b664cdc415cecc3976ed8b8c4693c7623b0a51cbaef26ff74120fb
-
Filesize
210KB
MD57e24101d07674f515f86388b10946efb
SHA19922693a3ce6f842267198aff3c69de484b36ee0
SHA2563613df9263d570021b066d7bb7be1e82c900be249f3f15bf68f12914a2c9a510
SHA512f33079af9b830fbc8ff35bed4507fd39c0531d92fd1fbb568bfc69c69980092ef64df035f65e733814ddac734a0e4bef1ed76602c094bc5cf04674a2c2505a15
-
Filesize
216KB
MD5858d10f8d887e95d0f72dc5fea31b649
SHA12b6335610fa37e2e764523a9a1937fdbe2dae8b7
SHA256dca746e10e2041ea23ed3f7958579adc8cfac9f40ac75fdab12250252cd31103
SHA51269802a1f3e8ebc959fe1ea7036cabe0588a5d526135ebe5f9f167a03058e02bdab3abf9305b0c1671b86cf86bb3a0e51bb3061636267f65c1473567d2bc706b6
-
Filesize
14KB
MD5033a5544c19186b2b6b76b3408227dfc
SHA11357170c70eb534abc768fe14ef37ee65065fd0e
SHA2561c04cf4e833d7b7ce2b11d6772b837819828ba518c719fa0009e08c3736dae9e
SHA512038d0c5e90d661a1bb9dca9308ef0001135ec371bc5350b4a5550b03051bf2756f84cffd0ae332abd47af655f3c43a73a6fd3771edd3c0ff31fdda23899e8918
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5f8f606a032719f0447a78d9b50fb672f
SHA145d741cb2185064eb8c06a91d79c928fcb657abe
SHA256d5e5bb3e87ef84f4e352d277fbe38a57f65ed50c0f8309dbff43d57af778b3ca
SHA51296169b9bcfce9f671452010340d707e2dd3a60a1ba2847cccbf1fff2dd11d0f74dfdc74cb9c20015bdbe95479f52501f9ee30ac634f547006104fba349472b65
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD527152171537c47796aa7194ac41383bc
SHA1430c380ea885fce765a771cc40cbfe6358b4d04c
SHA25628276ad4adb3f540918a28a722f10a63406037b96a14e05565e31ec90c605c22
SHA512044ded8d45d2249f69ae617768398a33cf060618f1cb583aa9d9a34171de10bf3e23f6e49b3c0b8ca872f5ecbe98e841168fb3e94fdef2efbb299a3cbc01f616