Resubmissions
09/10/2024, 20:20
241009-y4mdpsxepe 8Analysis
-
max time kernel
104s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 20:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://corsair.wtf/applications/core/interface/file/attachment.php?id=8476
Resource
win10v2004-20241007-en
General
-
Target
https://corsair.wtf/applications/core/interface/file/attachment.php?id=8476
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1656 winrar-x64-701.exe 5108 winrar-x64-701.exe 2920 winrar-x64-701.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133729788732636568" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 5064 msedge.exe 5064 msedge.exe 2616 identity_helper.exe 2616 identity_helper.exe 4100 msedge.exe 4100 msedge.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1656 winrar-x64-701.exe 1656 winrar-x64-701.exe 5108 winrar-x64-701.exe 5108 winrar-x64-701.exe 5108 winrar-x64-701.exe 2920 winrar-x64-701.exe 2920 winrar-x64-701.exe 2920 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4892 5064 msedge.exe 83 PID 5064 wrote to memory of 4892 5064 msedge.exe 83 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 3580 5064 msedge.exe 84 PID 5064 wrote to memory of 2964 5064 msedge.exe 85 PID 5064 wrote to memory of 2964 5064 msedge.exe 85 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86 PID 5064 wrote to memory of 3144 5064 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://corsair.wtf/applications/core/interface/file/attachment.php?id=84761⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc13cc46f8,0x7ffc13cc4708,0x7ffc13cc47182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2510509953485911758,13073943221994683478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc139ccc40,0x7ffc139ccc4c,0x7ffc139ccc582⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1752,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3308,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3864,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4492,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5108,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5140,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4468,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5372,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5392,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3260,i,11572036482445011705,1658718826627613776,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3404 /prefetch:82⤵PID:1996
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4008
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\aa6268a7c6cc4ed19a1ae0c99d04920e /t 4692 /p 16561⤵PID:4676
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5108
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD53997e2c8876cc3aa08ee10f17fbe00c7
SHA12ad4eeba9e7217096983d24f9ce049676d1f49cb
SHA256f6abdefc2f8bc30aad909d93f703abbdf7f6e5f6455c026bebf67a2388541e0f
SHA512e08527e772a37e3f7c337e32fa2de7cc435889812b56baea19a46efa90361726eb6c31107aa55227eb9ab158dab7ba9d3a9992bf8660a2e4ef6ebfecc7693efb
-
Filesize
4KB
MD590915ac6df56aee97718809b53ee32ce
SHA1c3b7f38dcb2cffe24e4af4356239f197151054af
SHA2563057ad7680137a25c40188fb9746f7f66eac9487a1771d710af3e30dac7a2302
SHA512f1aefee2c5a24e9c700cec7c20143e5fe28c93d78d586124751f6b227999881611d9904c99ed6c2c48002de3a66e55530270d852f2b748b6b93ae0301f1d7369
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD53fefee7cdc5c587e26e668d37494537e
SHA1747554334d26a5a3aa5df1dc3ba572e27484e290
SHA256746360b45c40e69c0250fe79c880231a3d5be1dda38cb790b416cec61fd735dc
SHA512c9ed7a27503b70446bfb5f3c1023f7707bd02558724ad5da1c91c2d4692ba01531447c501843a785590a877030f058417160dd85ce3b7b6c4bcd572a66aa8523
-
Filesize
523B
MD57025f323b2095390465ca795420ff32b
SHA1cd186e8603b2b6642be45c90f6982ddb48b910cd
SHA2566b60f825ed133b4b22ea2413ebeeabc359a115586360b1d1f7317d360e139ee8
SHA512cbd884862d3da45538f4daac567fa29241fb9470e4a014c2ea5d24883daf62ac47d10930a40ca9b688abe533e8f87e7515541ff73a7b52f7fe9aece2d2747c88
-
Filesize
9KB
MD5f39880574dbc505bc95ddc23157ece67
SHA10b1824daa63c38a7bc0d0d7c74ea4139180836d0
SHA256eb65ed429be71e5c7bf4261606d29c4a50e0e736b6f4b0b100998bd33f07bc5a
SHA512fe956ed68bc1bac3e1eb9a8d31ea862d179c28f1810a4718401707c492d5bdccbbb8fa5c3e253452aed8ddbeab7f78d3ffc8d1af2a6474644152606babcae8f4
-
Filesize
9KB
MD5512156d24c4f481336427637b903655f
SHA180ad81bc12297cd1aeb38b9f993007ee8ef9db1c
SHA256cf5811403e64758fccdbda75c41805ed47dd22e967bcb0c7ad59fb0c9ad20f48
SHA512b6e51089de6eb247571ee596cc08952f796d79c46ac7b9c5e6a7f20dd993a353f8d3b9b9eef31d8eadc27997c01fcce56a468e6d03a9b46cacc85f6f235a932a
-
Filesize
9KB
MD50bd876dbed6437b9d786e36c72a29714
SHA1c36eba4ad2556f8e18279bc008e4fdd7614dfb46
SHA25661ee2ba5c7d7f2ad37162c20ecad1676a9eeb4de23c3ec21d265c8ee8564cc6a
SHA51294fcad7817cae99f74cae3b94a182e2a6b31bea328e740384c55682545859707ece9bfb63ce8057b60c418708a7ae8ad825b00320339d724a991abc25b6ab4d5
-
Filesize
9KB
MD59ea6057b60647fbeee283d1f4a78bacc
SHA1e190a24c47265ebe3e1dc2e7d7ec000cad5a3945
SHA2561a905ac46825418bd6b034703bad070b61039a7c3e999e23c607c8a8cb4457a1
SHA512125d3cfa875c830cddd5ce40fa2544f160b064e122016681681be92b75a52b9e7b5b1ee348d0ca027231342ea53c53602b41a152a4b67cbb5f7d66474b4d5896
-
Filesize
9KB
MD500ae546bfb7d89599a34da571e3e4dd8
SHA1489b92ea17f50267443eb06060bd124aef24ecce
SHA25676f276849b7254fac97c50ac50cf6b83bc23cff3551b2a684f0c4c929748c8ba
SHA512347f8c1325fed9769cb2db2017df39d2613026c7d37d41f4c3ff5bb753f28aba2dc72557d46d3175dec05e959fab063312d8da82e83146a6a3475464b6c5a80a
-
Filesize
15KB
MD5c5a8770a1be12506e90faa95052bf14f
SHA1270e13ed81c473b46f7b7cfbbbef154b9320e182
SHA256570d6664f33f7ff89c7c7b0aaba3b88ba81fe847772f1d946537e216157a2b7b
SHA51274fcbe279f3cf6eefc956c831c7e553c0c29e7d2695004253d8c837f44bbf751705b799a944d46485f7ae0c68147381f75f2c0204424adbeed238023eb5f5b03
-
Filesize
227KB
MD51cbec5a57c6f19433efbc7a5e96a2a05
SHA1aea866647691eef4fd147075c3fbd81458f30f9b
SHA2563d42c6e04c566414390020603b82145bb432385958c9cb63ca7aff13af3e7112
SHA51214371bc315ca0615fac7ac16b56066102ce28564aa54d92d0998a6da10ae9816ead133a70178cb0fa4a1c67838d43546517f5c7b03441114512cb7f2175a6dc2
-
Filesize
227KB
MD5a0988492a463eaadf2a75000393704b8
SHA15c586dec5e183009fe51796bc98a22e745f092b2
SHA2567422a27a9574b1c13cbea9d3230e2c5e66be517d931303c7b5e5f1ccb90a194d
SHA512a3d1c366a3cbf0894dad66cb9346b5e3b6c05ab573b45047ae17583e4621d2090ac4a13c05cd0d7ab92894eacae45b60e25b21dd5e5f6980549b2ef5bb8a25ad
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
179B
MD596ed75f6d09e7680821f214e90010fa5
SHA19ee62f225ac085c5c5e642d684b0afe9143f41d6
SHA256480577e51624d84e350cab8a6c1a3a44c5ba909e1090d2ca85b4007d4697f255
SHA5122be29b78ee31d3067dc8c04e929c554ff35d8d0e35e2dcc00a6e36debec47d4901cf0a1631fc2c22479e7ef5677f929cdc4437154d5cc380a8a8cce2c5522379
-
Filesize
6KB
MD53b8fe6ab4b7ee509c83efbc5409b4d40
SHA1f514e85f73e2573340f8fe03f124067b2cd7e82c
SHA256c50dd4589f2c103621a46c25a48b26da06638aeb9992df4e5fd92ed0ccae6a7a
SHA512767c183ad9f51f52bdaeacf523781873ca4070c6a30ea8e82fe0e821a2a305207daa795dceebba35497490fe4b1cf2f39194ffb574894edb71e8504e7f7c1540
-
Filesize
6KB
MD5147effbfa8c820fa1ce7d968c1da04f3
SHA197a34b703a87fbe7b66718d3f91da48c5de84a83
SHA25676e0f2fcd847481581f027c4a17f271a22f38f9e82f9f7d89c5526408cc325d0
SHA512ce91c84ac480f5802522f765b685001e30dead0d6b4f21c45d9c9659efee7920718d6cd2b18546f34e9da215ecdf22ae99e90e5c72798997e2482634390849d1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57b1361892a8721f9d8ef1bb52dd06d5a
SHA105b704d92b2aa60726f5ffa6f3b3d24c2875d9eb
SHA2569d838a0fc25fc01d3548cfec2470a5ea7da044c832fdc3a514792d38e94c3a97
SHA5124510343378a222891c7f9428e6e9e2bfcaa286934df08ae28102c3d02a865b80d08889d0ba8c3b03eaa2bc2d7b46d2a11a8756d4ba8dbb5fa1e821f3d175dbc2
-
Filesize
71KB
MD50d2bbc335977db35cf0743586694e5d0
SHA1378f2a48c673cc3ec2a6bec25c82f055330350fd
SHA25611b91f51d6aaefd87597319fa537940942272c41195332f2fc0f1683da3025c9
SHA51259ce41da40ff0b16ea52d563767969bd855da326a34d7a5a3d15cc1f32c52a1a4c36e6d4915e1953a36359023a158dfac696c402c4176a6fe1f712ac4d003b1e
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6