Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 12:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/pX0hBaJS#VV5khgz77nLbZDiUUrO7RloqeX8VrXYYr6a9bZEDNJE
Resource
win10v2004-20240802-en
General
-
Target
https://mega.nz/file/pX0hBaJS#VV5khgz77nLbZDiUUrO7RloqeX8VrXYYr6a9bZEDNJE
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1117069422671188109/cep5kWUSemmypgce-6GNd6aEGzUmDwmcSx6RUsK8Lwy9F_BYr7gzbX-xSh2ikm99A38C
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions spuff injector.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions spuff injector.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions spuff injector.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions spuff injector.exe -
Looks for VMWare Tools registry key 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools spuff injector.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools spuff injector.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools spuff injector.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools spuff injector.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spuff injector.exe -
Executes dropped EXE 6 IoCs
pid Process 2692 spuff injector.exe 4780 spuff injector.exe 4892 spuff injector.exe 3636 spuff injector.exe 3468 2pKPn8W8KA.exe 4656 2pKPn8W8KA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 77 discord.com 93 discord.com 100 discord.com 102 discord.com 103 discord.com 76 discord.com 78 discord.com 92 discord.com 95 discord.com 96 discord.com 99 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ip4.seeip.org 74 ip-api.com -
Maps connected drives based on registry 3 TTPs 12 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum spuff injector.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum spuff injector.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 spuff injector.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S spuff injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S 2pKPn8W8KA.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString spuff injector.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString spuff injector.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 spuff injector.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 spuff injector.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString spuff injector.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 2pKPn8W8KA.exe -
Enumerates system info in registry 2 TTPs 27 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName 2pKPn8W8KA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 spuff injector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation 2pKPn8W8KA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer 2pKPn8W8KA.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133714801026382687" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: 33 1684 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1684 AUDIODG.EXE Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 4868 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4080 2852 chrome.exe 82 PID 2852 wrote to memory of 4080 2852 chrome.exe 82 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 4660 2852 chrome.exe 83 PID 2852 wrote to memory of 1928 2852 chrome.exe 84 PID 2852 wrote to memory of 1928 2852 chrome.exe 84 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85 PID 2852 wrote to memory of 3816 2852 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/pX0hBaJS#VV5khgz77nLbZDiUUrO7RloqeX8VrXYYr6a9bZEDNJE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff974eccc40,0x7ff974eccc4c,0x7ff974eccc582⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4632,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4888,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5056,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5456,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4288
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x338 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1200
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\vapeSpuffer\" -spe -an -ai#7zMap9949:84:7zEvent215231⤵
- Suspicious use of FindShellTrayWindow
PID:4868
-
C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:2692
-
C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:4780
-
C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:4892
-
C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:3636
-
C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe"C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:3468
-
C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe"C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5081688f9f96f465e3a1ae3063da290f6
SHA16bc3a964a6e476880a481fb2166b0c0e3c090840
SHA256171ebf430133f91f9aa6b1f9da8d2f7be65d44bf27ba5706b76c1e4c5edf2450
SHA512e66fd86d6c3300160529000cb0836aa83c5872ca636fd1f1592eb08f580ecbb0e688b11dbe7296e5147d3de47de53b60dff843af4799aa2c2368258bf008426c
-
Filesize
120B
MD504c29b3ac0239faddb4602bac37ef90d
SHA1b3fe771647a740437369689ed0321c8c8d246197
SHA2566c85011cf77b060f06d09bfbe3c2b38f9e24d92975eb491959c5a52c7fb61757
SHA5124d91d89b36849cd1949de84a3a14c8a1fff872ed985604e1036ca8abb60657495fee278587770e1bbe2fca32c468c053a0346e0427e3968fd17a850129b7bc2a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD54804e1c2cb6bdcf8b028b524539d3f4e
SHA1d1089782bb72df63df937edf57f03df11f70535b
SHA2568fdff627d907900a5411020db42a6dd85a8b6b860f6ecc6d6d3ca153e31894ea
SHA5126ff5aaa0e69d7d300f09c736c97ec19dbe4cd263a2584b5cf14724337d4dd54553c787bea84d666f5a56b1e11335be8a7665892655fd2fb1c3c73a0394b9ff1b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5aabd223d6391200a5e6022f341285913
SHA1746b0d28cbe6882fed84bca5b029ca7d1eaf46df
SHA256014089f96562efc8e0dd1e5506558dd315de818d6ca1adee0af0cfc5b0e1dc9d
SHA512561c0644cbb2ca11f4842accbef50f81e0a82b9f0b42b1e97c86af176302c2220e5c9e57744badd96c9759efed28dd31d8e930d768b76c87e29dad2a86b0b2d4
-
Filesize
9KB
MD59bdb9caebe46a3a13386d878e3c6c2f6
SHA1fffa3ecbaa12ce27cea4b926c9406d21b6f3f639
SHA256f4242744fa157ef9623eed909238b9fa50e6c71766fe9078704654533d461653
SHA512da8856c8913da561856734fc1ed2d13cc1750c659fd82413bf5f4bb6a36667df6af589244d593d9b59a94d8fde7acf3a445b43e7c1a2807a55bf6c3c0cac6357
-
Filesize
9KB
MD5740aa283ee95f90956732972628e9ce9
SHA1f6f8595cfcc584e80f7f3706dad38cbf4c9be3ee
SHA256791ed665a64c22143b6bf561fbaa945c459608689da0dc03f3e09d3b4c8e49be
SHA5121a0eede2564132e3b8cd8f7c54cfdcad52254fdb3867c5927a2a250b2975a2c7a9b9cab215f81108f3b95abd9bc99b6d6d36ecbbe1213c5fa1ad438405e1aa03
-
Filesize
9KB
MD521831d3333a3fb7454e0f2f6ec23b85d
SHA1ae5a752427c005aac2e68eb214322d35ced96aa4
SHA256b2830c5ab2e6dd031a7d319197ed0bc280a0d76c9c499bcabb4f8c594dc187b2
SHA512a5598bd719510580a7273d2f91b6e8a4e2fd558a24dd56a2f83ed40728d303ca0520c6e1fc975160fa2334dace57efdc88ffe657515644a5efa859cd3be95abf
-
Filesize
9KB
MD56f226806bb161a7abb7930abb40db352
SHA1c7dc29165f02e3b300372e8c54ba56c388cae2e2
SHA2565f5a3d4451a22cebc3454736aa6728e1a3a60e1e097d732ed33339aee82cc2a0
SHA51272bda5dc4f15fd82a7c6c20aa77415c867d9083f31ac227ac06cee1d1e56995c3d7254531f8e56457f8e2a5dff84b378c6d920f3c17f69b30fe9a02986b1d55f
-
Filesize
9KB
MD58dc126724d574c3a44494c77d90366bf
SHA1b5cbcf5d5c6f7a06c17be796999e733fc00966a6
SHA256ab9cfdaa6250bfaaf10298346e23620224aa373bea4dce4ea607217d94a370d2
SHA512e9291157cb0fd3d88f4793dabcab8692382071dea89e81f66b4f162bd555ebc43e59cb6db0676fba55533017597fb52a7cb4f61c9e5e6f82005e7b6666af7a40
-
Filesize
9KB
MD50e09ea32b906686fc435aa3e31fb249b
SHA1f2ec2545e6e205bbe893c735e37131d02d3f6753
SHA256e23d5a6b8ade6192ae3b9a7a0e2f80aad1ee0214d2168f984345c5daaf70c694
SHA5121ed7304d43b4e39238c6dcf96d1513fdadd98dfc6feb83af373c60aca1b26243c9c86e6675f5bb88e7311a5a04e61ee63cdb43b15e33102a03f117044c8f3e91
-
Filesize
9KB
MD51dd454cbaf3bb1a50001211f7fb467f6
SHA1e1066c86bfaaa8f7951ed9b15ad0bcb947817d84
SHA256a5e2ba8b42d8228ccfa991dcf2e922adb93c36fad78f32bca8c32876a174ab0d
SHA5122d0b8900e2b5514a1a01230e6c5a6578bf11f3a9f666971f0b23593e5f43c37e881547d892e5a203a796fbbc0cdc1a25817d05f3e2fde552ba2d51acb4c6c757
-
Filesize
9KB
MD5ed237addf2b29a47e141ec117022a298
SHA1d5b451d2ba8d518cef84f4a60498677a2f203aec
SHA256144f54400164bc46c618822bc7507028fc9b507fe88349f72ae77f47919db219
SHA51298fe9a3664104f6ea1ace6d153f9189a83567ac212f74593bf637b81559d5c8ca64bb89ee479b29078a3b751778f4b10b14b802698c23facf8be0aa00cfe63d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD576da063417ef3ac7f063939cdf351c33
SHA1a1ebf5d2b60de91fe63e9db226e5554b85027654
SHA256939a6fe8e534e46746910bbdfd4c0c41fb926402d357e45b5e988a30617e9ded
SHA512e10758b41f8326e638995d2ea9a2bb7bab2fe2e2df27f513396a61e6797ecf1b1f40f19411c4d853eaddc972c11053caa1ec8d98b2a4f5b2212b3f5a0cd73873
-
Filesize
99KB
MD5f405f7d2a1146ccedf18e3fdf89e5df9
SHA14767948c47448a76e85ab555267362d5694d286e
SHA2563f2b5a9e13ad8df590f7df6d4379fb299bc69ddb1b32070966ae4360ef94e2dc
SHA512457279b04eafb504335175e3e7cfbbd600de59b9eef3fa084b5ab4d42ec54c912e54341973c9a985c22c099cfe74f1609187ad8e70175e2d176822ddf2226440
-
Filesize
99KB
MD58bd437c22e827d48fb7dc3db0703dd5f
SHA12d0c8f880037057d269a3a1847913a4a6465afac
SHA256a5175171ac974e17ad1b3122e7136fb3cf0116397b71b694952893a8371f7544
SHA512708e388f52080c3fd8daadcb8c888c9d28965866b94143b14a9803988bf2f6cdee01a2d04479080e40e8dcf370bba46fa4a18c01f0806224c2ec373d7096430c
-
Filesize
3.1MB
MD59d44dcfc7d26450adae63a1d442a20ab
SHA1776e8cb7337f853c52b26ecd4cbfcb6a65c660bc
SHA25679eaaa844003bf1b13d636fee7be489152c50fd8085f638446198fd010762ac6
SHA512db704bbf7590a52fd02224dbad37e60b7099b9d916c3b3d9d2953cb1afaab74f212c260df6c4a58dfe3f1472d83241209c3a00262dcf707038335ba1b580ecd5
-
Filesize
41KB
MD5c0f2d418c67db68bb879d8b45767b31f
SHA1599f38e20ba503829621647c1a20c449797724ab
SHA25650176c07a81e0f6cac89e8a783abc03aecb196179c8b49a07945dce37120d7d4
SHA5126c7e2fdb939a03b4254bc270af1322eda5cf4ed64cb909c67406e2b9c7520c4a35dd9a9d6c434633d2521a873d37ee4905c82021b8a8518b8b87372817f05019
-
Filesize
41KB
MD5acffcf5d0df204936e97299c79274900
SHA18779b59032b6a0364cff20661ebe3a47afff8ae4
SHA2560b9431cd08e84e39b59d31079b73b2db3cd044c4b3d2b9a0da147ff8a3c2a61e
SHA512f51b26926af43a9140b453989fffcd596038e9cdee3926c8bd17df85d458655f0bd389eeca01ff6d20053604729802309bf55db3f064291f6d12e79222f2d309