Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/09/2024, 09:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/B5pcMk
Resource
win11-20240802-en
General
-
Target
https://gofile.io/d/B5pcMk
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133719900770630318" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\twisted fears.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2932 4944 chrome.exe 78 PID 4944 wrote to memory of 2932 4944 chrome.exe 78 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1012 4944 chrome.exe 79 PID 4944 wrote to memory of 1072 4944 chrome.exe 80 PID 4944 wrote to memory of 1072 4944 chrome.exe 80 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81 PID 4944 wrote to memory of 2596 4944 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/B5pcMk1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd493bcc40,0x7ffd493bcc4c,0x7ffd493bcc582⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4088,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3340,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4396 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4628,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4980,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3312,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4908,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5168,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5248,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4772 /prefetch:82⤵
- NTFS ADS
PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5372,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4708,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5644,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3688,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4268,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4716,i,1940386993472967282,9128174041969513578,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
101KB
MD5b1846502cdbadd67f3711d1951534188
SHA152af0d190b89ce39485100b66bf1fa0e2b368280
SHA256387823279d08213425df4cd42608b8639a3e783d71105bcba40e12720c410aba
SHA512d7a008940e93f166267e2ea46e94ff4a2b9fc27e937316dde06180fc189f2b320e04ad919010fb5ed531399ad797cbd87641f30f17ba38e1d2c0196d34d55468
-
Filesize
649B
MD590ddd535edd3fd9bf3b83b771008c62d
SHA1d2503a8c43d3019c1fa66956dd504279e61c2c9d
SHA256e634477af1c5e11cb65f046023eafa41852401a34fb244dad4e7891b74390b5e
SHA51241d995fdbb44d70c969a00ae40457cef59de738ed8498fba7f52bd106be0aec9b85e07044ea503d89c9da955157ccc63c852894973fa49c9a56fb541653ae7f8
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
Filesize
41KB
MD50af350c480ab565287007d89ab48a899
SHA14bc2a2c1ed2f10d047429af7c9bcaab3a34f25bd
SHA256030239207754b0195bad3b58d42e4bfed6df4aeaff730c3fbaeed92021ca4b85
SHA5123586ded7ed16c12ba8201b1a215f818e0dcff598e012001a4765cd727587e5243c87c8e7afe84af623d34beeced1b536e1e1671cb3baf72175512a6800efdd6a
-
Filesize
1KB
MD58739cb57cefad7e170706a119ed97222
SHA10623813e03ba7a6f0fbf51ecc257c942037474cb
SHA2565eb7122910e465a14e7a745240d62100cd764ffcc01eeb88771f52104d8dcf93
SHA5120c668450ce75c012a7ff2e107872c465a3a4083ee1d2860bc3bfc4dd3313bf31a53fa86e2b942d9b4794f5b74adb1b260b63040c6daaaa0183d81961c3fc1001
-
Filesize
1KB
MD52b0f21633a3f396f8d72f07b10d26500
SHA1e726163847548f6bbd1d4e300603497836a3cb71
SHA25644304f6129cd181e6f68bedaaad469ed7f3916989d34e82aa2df13e471469949
SHA512543c3b089051b5778753a8291aacec07e0b82e66cc2a819c8f2d8ea913678314fc2f53523e716c2f06eeecf340426306d6a2028a0c7bc4732a5c72f706d90082
-
Filesize
8KB
MD5918255c9a58cb13888bbd87941175f05
SHA1cdec916fc36feee78474b7dbe92773dd979d3f5b
SHA25637f887d84a8e6740222c662c9040423aed483c47e5fd0e9b6085d8631f8606e2
SHA512db218088e82c88f8d8e509291b3ee60faf63fa0ec488270a71660860758510773ae0172c067622184fc9dc4183b44132b0c6524ce749fe0f97392ddc001450cd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD5eaea2529795ad21ae0a7b92e784e3890
SHA1e9b05574be3e5bfe5482156cf3f278fad80a3b38
SHA256c0f148c9c2287a360e4aef8f5c41ff6bf48b2327f0381547d4db83988168fa7b
SHA5122bb1ffb34357864a955f92de0b1c06d166b16753e94fafe210d908942a6442d8121a594ce75217edcf793f620d011ac78425a9df718fbd1e904a9bc92db74f77
-
Filesize
1KB
MD593b9be26f239d41c0dceda476706abd0
SHA13a78e3d58838bb1d7b16abff8883b171319a6a90
SHA2569b9bb123bed5a63347127dd83428d2e91366537cde7e9690ec46dcab37194bf9
SHA512fdd5660581d86cddc8d0ea86492b9f51af1987de1d30c748f3d03b5598abe9c2095b1bc4b162abcd58d345bd5905e903eda2f5621de42a45082234af06c37f8a
-
Filesize
10KB
MD5632257a2c5a71a24ed351f10ff638963
SHA18c2331b521a7f06b1d5102cbd214f38a3708aa7a
SHA256e1f7fd3c52dc783e9bd4002848ae7cff50074006f7d2e8ba8ff7e14ade46dcf3
SHA5129bf33d5f031009d0b6b03ffc63ddf8a357d12378e1b6ce5540f05aa21e3ac9e3297b92f293b1d8336df62502f78e366f9e359c78b0dd8eb706940acdd9bf2a09
-
Filesize
11KB
MD57ca439c142837e2a536fe35112b8b9d3
SHA1be16a7315c0a77bc61c2f77cc4614939fe25447d
SHA2563adaf40f20227e4493d2c50a4daf51b128ebe717d0ef67748e98579808f55a12
SHA512a49e9f802a3e2fe4086d1afdcf25940ed2d05f631735abfa12e6471ed530ad737ae1f175446674c78bc58c2afc16d35bbecbf4bbf33ece8d5c1875bbbb37fa06
-
Filesize
10KB
MD579e0e604f2ec5eedd8cfff938e43d0e4
SHA124fa9488d7fb0b5dc4b25aaeceb482dd5f21d34b
SHA25638abf4b1e6728d93fa8be896b3b5be57d297ed6c3e90bdb7d8b0f13d3b0ae1d3
SHA5129820eeda6925d1edd95788f32ced3b41daadecb7b6bd6ad184e748690e283668ed85a1c281d135e2be3875fdbd70b1a049004023b48c1b4d37a9af3c185cc071
-
Filesize
10KB
MD5290570f24299114861a9cd9d035c6eac
SHA143e7a268eaaf0f5dd9151b2b8570d055da84cb85
SHA256edc4c3549fd893d3a0cfa9654d8de9e55ed62126f6de77a5b65d2e70c3bc6fdb
SHA51241d92a9653842f0bf1dcd7a04fb977c8258ee89f8005e972b80d28e37a4a54b6cc3408e9de0ea9c007ba83c25b0608eec9e5510ef21435968298264acbf3c78a
-
Filesize
9KB
MD59873be7a96da98c92111de5d8dc94878
SHA173ea3b8303a8fac24dae2a364add1634a152cd7a
SHA25607afaf7a92795f5e1119464ee0db0fcae516506db8fc3a55bd9d1894cf0b7194
SHA5129916ec5688cb50581c54269b7f87b10071b60b12f050fadd7aa348bf991f7fb0c639cecb758332f7bc74fa8437559a597648cb26f5ed95ed8a38551114ad04b8
-
Filesize
10KB
MD5b66d35b8dc39b7245e25bcbc727e3ffa
SHA111bc2391b7c1aa62403c3e5fe54d9cf713ab842d
SHA256ba65957490694394d812c32a5ef079df432dfa07cb38298293cf06f451a2ad77
SHA512f7b8657cfb7c2a166627e7fc2bac3e1befc2445af123d671e2f2966080f544319d8f74736e4d26231259b1d28aaf3d3042efcccbd30978d9498efd7401c5dbf6
-
Filesize
10KB
MD589ad357370e86634f96ae3deb3f74285
SHA13b7df63002d9eb6359cd95c4de2b63c7f48ea282
SHA2562c8e5e6377cffa1b25e7586a0fcee91e7b0e2c8758c07dae944895e83e34cbcb
SHA512b69ceb53f197d2a8fd27897066110375780c0f18fd6a1f7c619fa1c2ad54161abdab550d1fb60a9c0ca64dbdbd62fcb2104d716f75bdc23f28b2e47f28c9e92e
-
Filesize
11KB
MD555a4dc975ba2cc01492b0ac7353bb805
SHA1fa5a1a7181aa09457109e94fa7a0f4b191263ddc
SHA256730a4992758a19063b63d583a1bc37d86df44a9d50b45c12231c00844440cb90
SHA5124c7d2f647761f66895e15ff3046efef371ecd27cdebd16b8343170f39eb925c638869c71371154222ee0d04fccfd9b055469eaac2e3b19b712c84d05fcf09ea2
-
Filesize
11KB
MD56a2ac44f506a37d042aa13eb63d6ad73
SHA17c2bb79d6af30273914317cf90da54959adf05a1
SHA256538b2c440e2eed29821f0921da3c2dbebc65bb0e4d36407de116b27ee776265c
SHA512a503c9890dfd4473d778aabe64c1a4aae620aea3376a01d84cf5d7ba37580aa451005aeb048a3302b715dec4605e9414b958f055e5241cbc2c67f3105957e428
-
Filesize
10KB
MD5221d9b725475fe26e0b1350688ca7fd5
SHA125f73cf866b949812b9dc79a043eb1b2f42852ad
SHA256697d754e0c32aac3e7d654315ffb0a4f5d25c696107af161c5c05c648b39923f
SHA512631683cbc314c919a9c21f94a0b59561f742f62397737e0b8bf96375ec6d8513b32d0f803f0f00b29fa9e6f316326adf76db9193d433de6a961cf2df72de27c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD556969a5acea94f0b4aaf09744ab17285
SHA148bc91e90dbe880df3b03e69a715c409ffd0c956
SHA256189fdee7dd69008eb25cba977ae900b4fc1f45cd7a66adf974283eebb84fc84c
SHA51208b3ab541d4059e82e9b00f7e388e3ace3ca5752b03a6f44c5d9189234cfe94f46b4b2f9a6c59649fd2ed7b225f7afdc96d1df6a3910b4d4bfa2392a3f410c43
-
Filesize
101KB
MD5423c7c55f48b94478bcbb04f0218d14f
SHA1ae810833f092eb458b95fb909a40daa731b73612
SHA2560043010e8aeeecaeb9dee591ebc7572630881da64489376194c62568c8b97922
SHA5126f053f2640ae9ccd200d3f50981ca0ad00bafa91da4c32f72fb2d19ad8cacb0905878ff953cd0faf927ba62818e519a69eb446b8479e8e5b9b5801425ab14a0f
-
Filesize
130KB
MD54b20744a4e03e733fad1d77db47fb7b4
SHA1099dc95eeb74020ec709c4dd7c4d9c2984b71812
SHA256ef963d0d2d66bfd329df958f28ae6a4cd28a7299483e42bea9ee9af57ef8dd55
SHA5123a24afd5645b29cf53a6177dda0bfe7779f10350c8dbfe0a32085c01a672285c6b823107f543bad374ce8d9d1920bca407fa0c13f9aa192948b02deb4844f93f
-
Filesize
101KB
MD597c0b9eb6539c5a1e5fa3b27d7144433
SHA1a234cc484e547398373540b09730e929070f075b
SHA256a5b5b89bebc765268f1bb064e088137c6b6a1365c35b6e3367ab4d9b7a793f17
SHA512d92061fe5b2366a37c097a308c28d73bf0bc197a2d357d2a40131ba3607f6cffd0b9882d9e9c96689294b1c78f5a14f83ac229b1a96b94b95b99dbeeadc2d7c6
-
Filesize
101KB
MD5f776fbbf3106d969d99d824cd58a2620
SHA14416d659c4492f08b4fb51e3bd458b5f8cf8d146
SHA256507469678a4388c5a4f9c967a133a69fbde60f93d60b7713c4bdca6a573fe249
SHA5124aa06a7eac773dbbab9369007215eee3f7b3448a76d41892ee96f12e81aea55a9a71c6a5140ebf7e86655c039a8b5d6005acb2d7f1c56fa74bd47a266195b292
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98