Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe
Resource
win10v2004-20240802-en
General
-
Target
de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe
-
Size
897KB
-
MD5
a8beb4b800d6a4cde9a47ff2e97d209a
-
SHA1
378f551dd21ca9be7126b569d804dd66b99e0055
-
SHA256
de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf
-
SHA512
b6d033ed8462a9ca84d517c4a133259c3f7967bb297ba2b6709d412524dfcf556e184fca39f56ba835a1c531b5f46a30b5035085c267d001de31f485013365d2
-
SSDEEP
24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8a4rK:ITvC/MTQYxsWR7a4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4396 taskkill.exe 2688 taskkill.exe 1128 taskkill.exe 2900 taskkill.exe 2496 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133726516659383678" chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 1692 chrome.exe 1692 chrome.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1692 chrome.exe 1692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4396 taskkill.exe Token: SeDebugPrivilege 2688 taskkill.exe Token: SeDebugPrivilege 1128 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 2496 taskkill.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe Token: SeCreatePagefilePrivilege 1692 chrome.exe Token: SeShutdownPrivilege 1692 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 1692 chrome.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4396 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 83 PID 5020 wrote to memory of 4396 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 83 PID 5020 wrote to memory of 4396 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 83 PID 5020 wrote to memory of 2688 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 86 PID 5020 wrote to memory of 2688 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 86 PID 5020 wrote to memory of 2688 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 86 PID 5020 wrote to memory of 1128 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 88 PID 5020 wrote to memory of 1128 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 88 PID 5020 wrote to memory of 1128 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 88 PID 5020 wrote to memory of 2900 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 90 PID 5020 wrote to memory of 2900 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 90 PID 5020 wrote to memory of 2900 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 90 PID 5020 wrote to memory of 2496 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 92 PID 5020 wrote to memory of 2496 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 92 PID 5020 wrote to memory of 2496 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 92 PID 5020 wrote to memory of 1692 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 94 PID 5020 wrote to memory of 1692 5020 de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe 94 PID 1692 wrote to memory of 2708 1692 chrome.exe 95 PID 1692 wrote to memory of 2708 1692 chrome.exe 95 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 5028 1692 chrome.exe 96 PID 1692 wrote to memory of 3676 1692 chrome.exe 97 PID 1692 wrote to memory of 3676 1692 chrome.exe 97 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98 PID 1692 wrote to memory of 3792 1692 chrome.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe"C:\Users\Admin\AppData\Local\Temp\de5ea189b27a5f40f9f16f8330129358ec780b6f8b17a854b5e4711f73c64ccf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcc811cc40,0x7ffcc811cc4c,0x7ffcc811cc583⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1936 /prefetch:23⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1976 /prefetch:33⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2256 /prefetch:83⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:13⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4708 /prefetch:83⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4800 /prefetch:83⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5028,i,3531777999517672831,14464407932134060377,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5044 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e01cc47699a23878cd90241873f0187c
SHA11d4a46147d8bd2b95b7817e29409d403e36a0bf5
SHA256d53de3b23703fd20d820d839f4abea2812e46fbd829c976bdc691c2f56a02b09
SHA5125463516d16b0c7b28c87ff88df195b9f4892bd96c8e561bf1ede6ce28eda942e8fa03273b198f74d0958b491b245bb79a05031d9fb900bf5f32da962ba02b4fc
-
Filesize
288B
MD52a83a1d1f173a2b67aed6adfdd2be8ff
SHA158d597ad11d45712012ecc0e0e7c7b99d13d0249
SHA256b16cc4a3a55fdde3c9f56a851443f29f45ef590a348db8327802235d8879d8b3
SHA51279a2ec9238a5728a41330ea36430a92bccf90db79986f3fb3e9aeb554571d798ed381d41d9a4736ebdb87203e538be4bf6dd504d388edc41db5831066e168fec
-
Filesize
3KB
MD58c7b3c77d089efee5e6419c851ffa9ed
SHA10fb3dbd335a5dc9383dd2c9e895ab82a5bbade31
SHA256a94e191cb13c008956add7d7981c3665d77db41a455cd38c3ec9924294f951d4
SHA512ab17d316a57869e5a27546f24168ed97b743f2c57b4132a5c42cc42f010bd8e93ecd8dc6b0d00b781c6538d53f88e5afc82f1a0c0c01b7206e57616576b6b0c6
-
Filesize
3KB
MD59723ef3e888c778767a4ab74002264cc
SHA19ab6f544804e3089c568a2d1e9effa48975edccb
SHA2568973fead6e020b11849274843d1cb870f5579a3f3a3db28e2d2a3db6a1291baa
SHA51288395d8a31a3ef56c0b9a003141cd12df5ca2c3cd0eb8319369ca6135ec9bfed370d4373b1f8497992bc132c6da40bfbdb01deb8f80b075a17f25ba0f02f5e35
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD572600ce29af8e6204f3499eefcd325af
SHA12e52679e2f3fce580a99ebee8ada70e1f12010d9
SHA256e84083e4ea3f6d7fe6750529e16b3f9488f6cdfd6dc2b4b57f6d0d917aac225c
SHA512f31974a49e93cb15a5cc8c44463266da338f4210ef7fb3ef841928ee254519d5bbd205a841e08d3e759cab77a1d773087ddff220b8b0a8de10503e11d250ebe6
-
Filesize
10KB
MD5abf241d700d500989113ea37ff0c55e5
SHA16fd0cb1afa68ab71956166ad09e99beb5a62935f
SHA256016ee743023fc499e60b92420ed2883c8219de8af913d785e7e792666d43543a
SHA51243efd78822e9df92fdff8f1e1d760f1b020ce1cc92b9d4185409064a06940b5a0d68809db87543656dc1318ce74d887c242d4a148e11d8b395276b23e974bba6
-
Filesize
10KB
MD568b789f3b53b2c48455ac6fccbd1379a
SHA15f4c7c51cd938b9e98c82d31d430d5e1b020ae6a
SHA256f6cc30b364522dc2bd7580f42e3c20ff3303d2ecf2cfc209c1236011ada6c908
SHA512e6580f0eda08fcc0731ec64e3e0f9d2d257ffc6d9c4cd439dcfbe30732698fa65b5d38c37fcbab80f7c6dae409e9102c4c984a7d8fa622685d01cd0e92065801
-
Filesize
10KB
MD5bc5a8aa846ff49cd0a3bcc7b01129db5
SHA1c35c02bed90f7cb23a56bb91e4cdba0618b91312
SHA2561ee3dd20d060d9fd696d5f0d5a41b82f55b987fc75dce559df59d4230861b3bc
SHA5125d1a4fd661f7c9f444256e3f44199648dc986b1852bfc52a5babdd8979ab15a7adbfd6287b65f3c67297e4f53534c00fa3103693294940ac999d0e900f2bb9a6
-
Filesize
10KB
MD508c3c44244f6e353e617130783650e4e
SHA17f261852f91ef98909d6f17b0bc72e0b4ba2acd1
SHA25616ce711678efc30d0923ce56e90c23e408d8c2f670b3c49ffd5e966962b894dd
SHA5126dd94983a2a8a8979f843b0659d1f23ba110a1cde444ada0603e31afec0ab4e1a4c5a4a8f8988f94bfaefd9e5c3a63423097cb42c10864ac78514f49f01fe10c
-
Filesize
9KB
MD5a316d9e75d38c88a6001a26e42b69975
SHA1878293fe81c8c2d5d018053547d846068363f385
SHA256fc4d35a8b3e5aaaeae7f4430edf92e3b22872837a994e6ea8bb70440de1a8ee9
SHA5120e0ba3a5bc4bcfd5b0cc944f6660c219a1c26e4874a9774e7cbda39311d5068f2e587125657d5b4f238cb8a925a26b8529cacef833cd2a250fe764606fb05d1d
-
Filesize
9KB
MD5bc1c36815cd85621996cc07f6b038ef6
SHA1ddd18266c5764be95fca2fe00e6b9e664c5a9d3e
SHA256aaea3ad282aa6579da667e3c4ac4a09d5c69acfe2103903b288799ef29247579
SHA51265d971a5328e385ca628b0007f1f70892c231d728d5331c4bdb1eb5942cd31de4674e5d706f5053112a6bc9c473059b4a4926786a4e3fe8714ca8bb3d484da3b
-
Filesize
9KB
MD55510ef58390657481636089260e0bb3b
SHA11b0d7e2f212627a91cbb607db50be41cc73202f2
SHA2562af5f49a66dfa9e558e53520e1b1b6ee3218d296d4b633e0ac424851f7baabbe
SHA5128e346c0617f7b9c0fb9eb1fee87af72172e132f1edeb9d2a36ac95102a4d3ff2a456e70d282dbc1a64b4ac8dc2de96a2196b7a88e8705ce6c56b82dc61da3e8a
-
Filesize
15KB
MD5ddb1343359d92a4af68ace558b2c39b8
SHA1e390529afd43b34abb098aac144b440e1b9e11dd
SHA256ce5258d9e7cb775e5a1d846ed6406028276b414e8c6bf724574b2d33606530a7
SHA512852c27806cb2c339c2e32ced33b0166fb765b1cd61d953bf445746f09909cac85ae143225fdd31c41b6995ee10f237d66387c28e0176d122ab11f167bbb0ca3c
-
Filesize
212KB
MD5c39af0b01c5054bf424750931445cc84
SHA1c51c76249995b80a0027cc95d012b85259f98d34
SHA2562dad64454bbe22da5f471c277953beba1911253deb1b9c9699757f65b2b751f2
SHA512af04aaa82ee33f5e024ca5c2e1b66452b92fdc838755e02affe91dd141ce9f4780d5887d5214ce952285951d9344450cb95cf728352b1892f58514771a7bd2a2
-
Filesize
212KB
MD5d15159f641c66d3337d675e8f69bf2b2
SHA1ff8b8fef366e1a217ab0b432bace286568bf5bba
SHA25660082d328ab837800653ddd6ca02598a8550604969b62007ab5938f11aca40d1
SHA512b2d7061bb49750eb2365da8fe163cb80276c6ac820f566556e80eb0367808c6f5af476a17ba93f8ad5c3b4a045ef1ce19213a5b6d290737ccacbe0489c7aa795