Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
Engine Spoofer 2.0.5/Engine - Clean.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Engine Spoofer 2.0.5/Engine - Clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Engine Spoofer 2.0.5/MetroFramework.Fonts.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Engine Spoofer 2.0.5/MetroFramework.Fonts.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Engine Spoofer 2.0.5/MetroFramework.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Engine Spoofer 2.0.5/MetroFramework.dll
Resource
win10v2004-20241007-en
General
-
Target
Engine Spoofer 2.0.5/Engine - Clean.exe
-
Size
3.0MB
-
MD5
007decaa4162946f4afae58675ea24f2
-
SHA1
a86eb4dffba6fa651ffdc016dc8cab9f6b583f46
-
SHA256
4d623323722623c396d129c980835c6c008c3fc10833e2e0220bfcd8969151aa
-
SHA512
1d60d4e882eabbcdcf76689b9c330b23edad748e578fa5db26f7b2f39dd4e6217f99577868d4a30c78d8f68ecedcaf36516736894f0463a69084d799bd0e2cc6
-
SSDEEP
49152:MeneANrcDamp/RMaBejg2CgEmweT0ibbFlx9SZUGZmCvZKHHkNKNNNpNNNmy:ze4rAa4/R7ejgISeThbFf9SZMqsc
Malware Config
Extracted
xworm
127.0.0.1:8080
51.89.201.41:8080
-
Install_directory
%ProgramData%
-
install_file
ApplicationFrameHost.exe
Extracted
redline
Second
51.89.201.41:29254
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b6f-8.dat family_xworm behavioral2/memory/3932-33-0x0000000000120000-0x0000000000164000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b70-19.dat family_redline behavioral2/memory/2788-45-0x0000000000AD0000-0x0000000000AEE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b70-19.dat family_sectoprat behavioral2/memory/2788-45-0x0000000000AD0000-0x0000000000AEE000-memory.dmp family_sectoprat -
Sectoprat family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2736 powershell.exe 2020 powershell.exe 4560 powershell.exe 1444 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Engine - Clean.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation unbinded.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApplicationFrameHost.lnk unbinded.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApplicationFrameHost.lnk unbinded.exe -
Executes dropped EXE 6 IoCs
pid Process 3932 unbinded.exe 2788 build.exe 2932 Engine - Clean.exe 1860 ApplicationFrameHost.exe 6120 ApplicationFrameHost.exe 1536 ApplicationFrameHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ApplicationFrameHost = "C:\\ProgramData\\ApplicationFrameHost.exe" unbinded.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133746367428904250" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3932 unbinded.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4560 powershell.exe 4560 powershell.exe 1444 powershell.exe 1444 powershell.exe 2736 powershell.exe 2736 powershell.exe 2020 powershell.exe 2020 powershell.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 4824 chrome.exe 4824 chrome.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 3932 unbinded.exe 6132 chrome.exe 6132 chrome.exe 6132 chrome.exe 6132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3932 unbinded.exe Token: SeDebugPrivilege 2788 build.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 3932 unbinded.exe Token: SeDebugPrivilege 1860 ApplicationFrameHost.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3932 unbinded.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 3932 3204 Engine - Clean.exe 84 PID 3204 wrote to memory of 3932 3204 Engine - Clean.exe 84 PID 3204 wrote to memory of 2788 3204 Engine - Clean.exe 85 PID 3204 wrote to memory of 2788 3204 Engine - Clean.exe 85 PID 3204 wrote to memory of 2788 3204 Engine - Clean.exe 85 PID 3204 wrote to memory of 2932 3204 Engine - Clean.exe 87 PID 3204 wrote to memory of 2932 3204 Engine - Clean.exe 87 PID 3932 wrote to memory of 4560 3932 unbinded.exe 91 PID 3932 wrote to memory of 4560 3932 unbinded.exe 91 PID 3932 wrote to memory of 1444 3932 unbinded.exe 93 PID 3932 wrote to memory of 1444 3932 unbinded.exe 93 PID 3932 wrote to memory of 2736 3932 unbinded.exe 96 PID 3932 wrote to memory of 2736 3932 unbinded.exe 96 PID 3932 wrote to memory of 2020 3932 unbinded.exe 98 PID 3932 wrote to memory of 2020 3932 unbinded.exe 98 PID 3932 wrote to memory of 4868 3932 unbinded.exe 104 PID 3932 wrote to memory of 4868 3932 unbinded.exe 104 PID 4824 wrote to memory of 5100 4824 chrome.exe 113 PID 4824 wrote to memory of 5100 4824 chrome.exe 113 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 2724 4824 chrome.exe 114 PID 4824 wrote to memory of 4388 4824 chrome.exe 115 PID 4824 wrote to memory of 4388 4824 chrome.exe 115 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 PID 4824 wrote to memory of 3188 4824 chrome.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Engine Spoofer 2.0.5\Engine - Clean.exe"C:\Users\Admin\AppData\Local\Temp\Engine Spoofer 2.0.5\Engine - Clean.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\ProgramData\unbinded.exe"C:\ProgramData\unbinded.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\unbinded.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'unbinded.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\ApplicationFrameHost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ApplicationFrameHost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "ApplicationFrameHost" /tr "C:\ProgramData\ApplicationFrameHost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
-
C:\ProgramData\build.exe"C:\ProgramData\build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\ProgramData\Engine - Clean.exe"C:\ProgramData\Engine - Clean.exe"2⤵
- Executes dropped EXE
PID:2932
-
-
C:\ProgramData\ApplicationFrameHost.exeC:\ProgramData\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbf7f1cc40,0x7ffbf7f1cc4c,0x7ffbf7f1cc582⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2320,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2316 /prefetch:22⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2536 /prefetch:32⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1996,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4412,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:3180 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x7ff764454698,0x7ff7644546a4,0x7ff7644546b03⤵
- Drops file in Program Files directory
PID:2736
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4712,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3536,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:5540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5208,i,11372913833245362383,8514986147019612710,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3416
-
C:\ProgramData\ApplicationFrameHost.exeC:\ProgramData\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
PID:6120
-
C:\ProgramData\ApplicationFrameHost.exeC:\ProgramData\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
PID:1536
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5a865bac6ef42d6c5b19ce21f0354a902
SHA106caff2aaa241849e46a2bab7680d565d61c6b84
SHA2564102f51991d25c6e12e74d7029b3613010595aca6612d8a2919b3086b9152e61
SHA51274f20cbac511c9647a7ced453eb110b78e8314cc0c774bb9609bbd6d1e293712478929bc5c027891dd2d1d9de452a305e27ed2f4ff93afb3612f703c98af2e3e
-
Filesize
656KB
MD5612080028164b12939751dcccbb68d4a
SHA1db066593c63d2eff41a5af1b49a3e098b60e0013
SHA256e96030fddaf7e78401567ee82480ad75ee48d3556199a3f85c0ec669edac2ef4
SHA5121879c960e27e32941c0c992b84803e7a1f8d243bfc88d17d3d32baca772290b9ea60a6ea90d53170be3bf7f0a58fe71ec901dc66aa560b4bf68b1da56c09fe18
-
Filesize
149KB
MD544538b311e9ec2bcf0a6452702628d99
SHA1da67301539903775708e9ec913654851e9e8eade
SHA256baf326f52d39155d722465947f4cc67e6e90cfd0f89954eab959568e9bc342aa
SHA512b65e3bc1c0f7b4c8f778cf52a36d628301d60aab53fdaf0355163e4865bc3d3adbf8870bb6cefc604708fdf2c0e72258eaf2fe301d524af2f77bc08014c9610a
-
Filesize
95KB
MD5ef6721cf0bd7437d8bca647ead8f0120
SHA17a2bd21a58d9a468380a47dfd81505b56cce613b
SHA2560ed605c6122fa4b3d84e89dd3dde7e3fca0aef0687935c1201f55d31a594d56b
SHA51270f28c80f7beebe6df040b07dcc782245d71a93102041c971c1cdfaeed2e8556fe3f641201486b7bbfbb30f6c511a678cf499328911a8c8d66ef2be16affb076
-
Filesize
244KB
MD558471a0ddd6dedc736742d6a3df2a316
SHA114af48beecc60cb181d72ba59ec2d6a075a9b9a1
SHA25684c9a4dd34de4182ac6bb2296302c00b54d9f948ee9b2d70a882c16b308dd881
SHA5122bc27010a11e97c96ea4b386e0691741c0a7daf22715abf2afd35b4c8d5ca419eb3cef373af175feaa3d6fdc89353ec48443aaff0fa59c2383e5d6340bccd850
-
Filesize
649B
MD527a175f34e1136632a418650a0f9ccfb
SHA1efb2b9c45ba4980ffd3f4bca85847adb6474f6cb
SHA256415f2f248f91ac162d51617120e908ae6563c6acd59a925c919ec8a1eccdbd8c
SHA5129aa16dd1f1406c8aef803a90544511bb907f6054fc1fd9585a0907bc1cfa375c2cdd8f6ced24b7ce059e082bc979e0de9c6fc42a09076266940fbc446b8239dc
-
Filesize
744B
MD5f73b594089f70975d522707452f87968
SHA128e402062dc5847e69e184592b6c490bc0c1146e
SHA25621610137004e1607b0efdd735a67e4490fc6e4273bd280c1ebbcb5ad1284f09a
SHA51254ebc995321ba9eb8a34e7db3d3aa947436f99b0b6b91e6b3c9f60daa2ecbd9e46abfe885f64d41fbdb858151fd3c7107320a65a3bb05e26786bc1da8ce5064c
-
Filesize
7KB
MD59d19f6c7f53d120aaf21d77b6fa040c2
SHA15eb6fc5f873a48430e2907c6c84a957e506a6665
SHA256f45e8e6f0a33c4a2e5d1781a0bcae14f99ff91a0c494162f11b0f47abb09ce66
SHA512c034caa6c4514b95f5cf492ee573e0816744452666b06f2f3c8b69a53dd56353b9ce1802a7d78f7e57dba41bc0f0e0afa7e01a06b3c6f91459a0909fbebd479e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d001483bef48fec081cbea8e27f0fbfa
SHA15ad1b973d89df3ba5422818f0b0245fbd1cebc8e
SHA25629538e3974d7f26022dca8eed5dec5982778ad91f32de07f8b4b0e24c1a49d1d
SHA512ab8bed3f6edfa928e2a8e216d8f0c51fb84f75ba08fc8f924cd05b0c04ad6a61015683eed4ca5e10679b1644d2dfc0c0e0759e3a64223d6b3f625b49c3b88ddc
-
Filesize
356B
MD5c7063ade259e726c8dda868524c893b2
SHA1290848ae465df6b9e4301a3f4ea5915a20db0dc6
SHA25668ce589115e23068e37a51cafe1b5dbaf86eaee7c5e6e0c3e31bc6976278fdbd
SHA512074c1cc7893a7da43f9e71dae143c7340ed847311aae3ed93a31a21db116cdd1e4d5a6ddd9671e590b03ca28c47c42444249d08b594a4aa3e760114911e820ad
-
Filesize
9KB
MD512f10eafcbcbae2c4081cb179fd19f71
SHA14a4439832d53de54614497ebe846629de4e20cbd
SHA256ba08d803a0196ab8137aea0e36f161cf8bc68b817b2dc9244115a24a8f2a9547
SHA512f17919b08e39cbc033c8cc12aea4da6a679c083eb76152498a5123fea3a7209008ab58765af0a8f88643d29ab0b7bd374df9a2b5e521c0bfb3b822c2edc32396
-
Filesize
9KB
MD5443d924009b49b14a5d6fee2ca4f2abd
SHA1c8527a17219f683e16e664a810a47a541cd9cf98
SHA2560e4284afa491ac3d4ca51f7e2659cac215616fbb4f889b448a69777b90226087
SHA512c602267cd67b81b0653b7557441819e15019c94f543083ddb89dea63885fec43ad3973ddfa4df94b11e435917b815f146dd9e33c48a3b6c4a822cfac6374a6fd
-
Filesize
9KB
MD51105bf0ffd46f48ae039932fc442009a
SHA170587e8e4b6085e8d325d2d18b09e7eb659491b9
SHA256abbdb1a8a21a4bc233cc05e627b6ab2e96a152d1f1d6b81b9e049f2e6f9ee51c
SHA51221911b22e033c25a36ba9fee5ab7d7881186ec77bcefc04e387fd55bcbc353aa29a881adaf6cf300ee36bb325701a3c2ab6c37f69d3618e68ba64893b548544a
-
Filesize
10KB
MD5b0c8841a405a31812c14d828726efe95
SHA1873ff6867b1edc7c1e6ab8311aef6599e629f965
SHA2568865fd4dd6a8c8d656aaa4c188cc3c8e555a02b1006f0b882e51d726da8dbfdf
SHA5129bc5ed100aa7e0113680d97f21874475b38234817297d2af9ff680eeccf855bc63a7089865daa15e2f4c75699dc0a005888c96c063122a9c39004e1db061d0e9
-
Filesize
9KB
MD506540bd6cda65aa951d59a2b740026a7
SHA11f5a5014ebad35a1ca1a66ec7339239d868ec606
SHA256c803419b58676302944d9a86b5028f302e6627b4de1af03ec877adeee8af137a
SHA5127210a861094ba994c05a02ee02f4461ce314b2b24e448c04d17b91bedd9ec9ff7d4d47a7fff0da73e3c8ecef19072f08ae6fc32870f9d2bc4bbdd69295e4a68a
-
Filesize
10KB
MD54223547dd7395d6a8ed5162992f7836b
SHA13536164617a319843e21d57360eb44aa05b4feda
SHA2568ea6b80eb87cd607055b02fc1041edb1c804df79215c536ed4d7e9d5e78e9ea1
SHA512f7a5550d15e9d03904be6e6ece9ef7532a62b7dcdf224ebc2d4c62217a491af4b0a377b17fe8575a12844676db7d4aae6b81b8cec8e32cd463c8b95dcceefc05
-
Filesize
10KB
MD5fde3c33e6ea7ba27e6afc9f8b82edba8
SHA19f2db5941d207c73938e91e0f1f8b4745d6f4089
SHA256fa44c40952bdcd3bcb7e09f3aeff0ef40ce9fe795c232c4f07e836a4af3aa5bd
SHA5124e87e5cc6833e375e190f6fc29040f57593931a5afec8bbc14270ed4591d50a7eefbbbebbac3208f3d06b5f093723e743d4422ba6212756ccc0ba0d1f565b03a
-
Filesize
15KB
MD5ef042fdae3d3f74c577e6ad5e21a04c3
SHA153c5a4c7175dfd53d9cbdca44a245bfdb2368a12
SHA256b9db697ebc70dc862030a77579565f5cc7dd554f5a4e202058a1d8b62a8fa2ed
SHA512e5f25858b47867b3cd035e833ad57944d10c9704e6bcef38547e29c843e863b8898ac8fc8af0255ddd5db502f22c8830d00efbec66d106999973c85dabe5cd5b
-
Filesize
231KB
MD50796a8363cd9e2770a159c666257c1f4
SHA197ab6ee54c610897f1f9eb646cbcb916c12c1670
SHA2568ac893ce6b05c7bd1eb10f2094673b158c415e753256e095d67987ebe290431a
SHA512529dddef53115f0bf68d259adcfa0aa41d33ee23b108b03247128e97e2f349a364690957fd479e8e7230b1f3541b75af79f0c56cf3d8cb347b3bcb1dc76ce1b6
-
Filesize
231KB
MD5b0120b340bd87fe916070966a58aeac1
SHA1e854c37046cf5be3719d2993264ec40a4b97d111
SHA25600dfc73eee2112d384056fa610685eb94453ee421ac7f9b96f9befc052d0dd30
SHA5129f20ff19c386eed8232907f73ca03dae3515b4fa8472aa42eabb2b60aa6db17f2b7130094782eb61842dc32f58bc5faff5765e5de82acb2e0fd5eca4167c74de
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82