Analysis
-
max time kernel
212s -
max time network
214s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-11-2024 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/u/1/folders/1Wa5d6JKZ1IjnpwNuS1L_9yh4iQiQcAcf
Resource
win10ltsc2021-20241023-en
General
-
Target
https://drive.google.com/drive/u/1/folders/1Wa5d6JKZ1IjnpwNuS1L_9yh4iQiQcAcf
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3312 winrar-x64-701.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 7 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133750312188860956" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 1276 chrome.exe 1276 chrome.exe 1276 chrome.exe 1276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3312 winrar-x64-701.exe 3312 winrar-x64-701.exe 3312 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 2448 3600 chrome.exe 83 PID 3600 wrote to memory of 2448 3600 chrome.exe 83 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 4336 3600 chrome.exe 84 PID 3600 wrote to memory of 3080 3600 chrome.exe 85 PID 3600 wrote to memory of 3080 3600 chrome.exe 85 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 PID 3600 wrote to memory of 1124 3600 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/u/1/folders/1Wa5d6JKZ1IjnpwNuS1L_9yh4iQiQcAcf1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff8ffc0cc40,0x7ff8ffc0cc4c,0x7ff8ffc0cc582⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2160,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2004 /prefetch:32⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1764,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4620,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=836,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4632,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5300,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5388,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5236,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5228,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5288,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5500,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5452,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5716,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5688,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3252,i,8172277449361942750,993060728549537904,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:3104
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5d971892f7822d9656753c959f6ea4d2e
SHA1b946589da001091433c8454190b706f42ec20410
SHA25620923a201ac1eb7452ae67bace062de9fed0427d0d8336760b3596bfcc0c1487
SHA5126ca352fbbb3d3463a41deee8b32d7a6b15412b51ac837bf06f8d8b64f0c636efdf7cef2b88156586e8a136c69328c92a12a21a0d627e63d4d8610514c1fc21b0
-
Filesize
649B
MD56f818538adfa716dca58f5fda7fd19fb
SHA13d06e33b9ec421556df2c6a4afad3c0d20e42ae3
SHA256d9e1ff8709659850b5dc1d0196180a63b98bc4fe8f656ee0d1c9fb9986069bf9
SHA512af42d9b9246b4f31fab20ec29e326f7244a47c72f5726f37e8894b56a5c174d400312c606da4e0cf3f7a858dcfd8f6de38b5b9cd72ef46abee60234f05b6f9fc
-
Filesize
25KB
MD59222217ea98c35e71acd00dfe056b030
SHA142fc786d7b865bdba84117ff15357fada69d3b35
SHA2561bbd4cf227b3645dccb3d9e3e03736d4e7612326ef09126cf18fccf00b1aac4f
SHA5127aaaa2031579bdbc89a31201613e26f4a1b67998cafc0d2372438beb22f11ba0bcc13d41c6d6e074b3e5a8d87a15dee42747b796c92d619549e83bb117362780
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
936B
MD5f516254095a2f44511c7cfc23b2ceab4
SHA162f4fe98e7b6c59a810836d946df51201c36a822
SHA25637b7f30f84eae137f4c78e6bfd66447cb3b95f3d7def4698cc831761a3cb6d26
SHA512d5c643b838ed297cb20610b4c9f9212faa678a33745e7b3b3cdea29520a9f93ac37ba23c8b2163654e337f6de89c89689592f0b3c2adb22695b130083aa2fdce
-
Filesize
960B
MD531d916228781f6b58322f6d5175de65b
SHA1a2200bf69374865318c88976a729be0d23d7a025
SHA2561308cf623ed4359f5bd7d288021770004cac5e01da17cb6ba688a6131eb70b4a
SHA5120e8919f7c5e3acc86a1f1262e3f99ac8617074e88c60ba1f713cbc4456d2ad10bb4bba940b4439066df2deafcf8d4b5939f9dbb8d92353f2b616590fa6e1df49
-
Filesize
2KB
MD5cc46b1899dbfd3515360c9a63eed2a41
SHA14cc34cb43f8d5aa2dfcde519e4003126bd4fc571
SHA2564cbcf635241d6d4a707348f1bbb00749b93c6711cfef68f4a85f8b0e775bda32
SHA512a7ae5bfc034721af7ac5bc7ff938795889add751eb47e253d17b858955482024f24ef53a6c5095f837b4233e86c86b3248da9ce874405f9e9834e905ea243997
-
Filesize
2KB
MD5815474578850051e758ee4304bc3be0a
SHA1455a31909eb4eaaa66b333c87dac5a215dcc1bc3
SHA2565644295b4cedc390ac5be2277721a991bb61af3dc8d585723cc1825d34f6c964
SHA51240aa013a4d493a79aecc6670036d950d48f7830ab8dbf7cf09e299d4de2d70f89ecbea7a8c6fbe08ca879af3f530faa78a825546c3c367d5e3c336716def97f5
-
Filesize
5KB
MD59038ab88a5a214935e41f8a865b398f4
SHA1cf66b0eefac911dfe9f23a681dcabe7d61358a4a
SHA2562cc693527ec659391977894b3633a08e30ccde89e42b255d4b4448a5d910cf9d
SHA512f3f825cf04a5f440f6e707862db5888143a463f1ed5ef0358b5a405f288db6520f1306e5809061b676f2fb2f359d10c581a2e6f763842c7112e7a03a6e6bf74a
-
Filesize
10KB
MD56cb36cb020a480b542acb1bd26954893
SHA1d8a817d7ce21eac101b16e9c26b28c580287f097
SHA2564b20e8d1cf8e0e870c03b8bcaec6ea67c119d3eb60fe52231fa35aa6f87a8375
SHA5128ac5e9a53ea0ba239342d6ba99e51dcb20c17d99edb4f055cd1e5ac2b31c9cd57668ab1d24882fe75bd3ef94e9f686daf9988f3838f669a1f4fd6c570afa2fa8
-
Filesize
11KB
MD5e2e8385a1b7b2405a44694c8a61f134b
SHA153ba7bc895047615fe51d5a607e4dce986998938
SHA256a6fa2189d2e596189568952fe0f77753dfb54bcf00ce9c4a918888d7266d7162
SHA5124c4f95755a229058b0aeb61b99a592bc1f40acbe7d0d3e18bc0764433208447b2c4369b12e98b199779af3018391bd1bd799fafe84c479fe163e17af2f9905ab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5809b08548fb9a4ec3f4c4f15fe9a9c54
SHA155db9d37d9fbada4bbf9161efc5d602dedfb1797
SHA256d75066ed5e84e039ebc8f33331237caf3e1043aa2468d80f0051e58e3641f677
SHA5129fe04b713580df96a4e01499c61fc5a52c7068dc4cb7291728e85de942729d3fbd583a2121b890acc0553b68ede0c1e3ce402c8cf817ee4b39148f7342726e5f
-
Filesize
1KB
MD5a6575ddc4a35e5b78bfdea72c265937d
SHA108b8ebb191dc15ba6bed272fff6d6ec0b9796ec5
SHA256e0b07595685e021d395770e21a987d3f94e04b2e6ebf72b157738897f614fe9e
SHA5123f0bae8411434aff1d22b16fea26aa4e00ff28abbf96949e273f6ad3849a78756dcea4a98926c3b8606f174870fd0c715468b8e8d79790c793c71c7e825d9ec4
-
Filesize
2KB
MD5be1f58468f4730be27605a42c2150121
SHA15cff4c0b3dba5bcec68b1d5f11a72eb77a5a8695
SHA256f04d4242d5f2c0ef1027c5d2366024184a23385f699e0e52e906ff5ee8eae83c
SHA512d5f95c608a93edc1163f19cef1c2e36278d93dd457062e62af43f9829bea55498571a4dd296e618d6a1482c46a8ea86b6078d37874b7146b299828107cafa1b6
-
Filesize
2KB
MD5acbcefe7ccc6a0154c13488dd83fe8a1
SHA17d4c050400404b8cf139dfe26a4dd77426f4cb97
SHA256100d5219e7ab06f6dbdbfa8b680f014803296c9fe78dc48fc06e02f9e2389103
SHA5120fd2941f3b77bc1f7422a6f4a9601ac0bdc3321ff14eba7a488b08e9f228da918222278dc73b4c1a6b57b049081c57ec63b6724e6ba378965764cbd08b32fd3a
-
Filesize
2KB
MD57ef2443b3c172eb4b8aa2e4ca96ec7e3
SHA1fd2a29a4e5c8155eb42fb4876fb5213b7594673b
SHA256e58e68f6c30ce8cba9d6d3b2751ce7d74a088745b9797525b2dc29ed162c4fae
SHA51250dcf3f931c6144b0c29613eab629859f05bd824ec772a2bd18fc607b2926eb55a83f7f3e37bfa708d3d9e9dccb1f90e8a4fe8c2bc73577dd4ce3f540d6e56b3
-
Filesize
2KB
MD5c74f620fea19168dca4db0feeb7914b0
SHA13dc8dfe59cb0d477cbbf586ff74ca0a3686b035d
SHA2568075a2348b2c981ed0b9ffcf564e0745474ed03203adf0bba58ccec9c25a67f1
SHA512a8bd338ace20f22723c1acdf02b014b65a03d7d49e822b7036bd3675882b4b427bd08456e466e1946677f239f76f3f8dfb2653cab439a21cec86a2c0e932cbb1
-
Filesize
1KB
MD5df3d3828fa021cf55712e2e9e2ce5e09
SHA1a23e2db3d16aea42fa2f530078005ac66bd26afb
SHA2568f176cb8c5298b99694365564dc61588b8db3a400e83834cbb78f0ba0edc3461
SHA512f84b4a67d121e829b896dc6505ad62dfa6389d488bf50741816167f591448d000d5c4af009a942eedca128324cd7d1f145ee1aedda283b02bfeb986900b45bf9
-
Filesize
1KB
MD5faac18bda90c3b0fddfc5c45ebb51ce6
SHA18f2f30abc53065d97ee88539e0767606bd5c17af
SHA256ac9e18f7cb51411f6e5112d257de5361debe265152fb38bdf446dd73c5ed2560
SHA5126f68d8e2e0ea7e153e99d79f06aa36015edc6805838b628b48560020777a5f14fc81929c0461c177482776cc0dc2298cfb60fd9d3d73f36f3283b6361e13b0dc
-
Filesize
2KB
MD5b6338c2d8750a35f4a62db02c320d9b5
SHA124f969988ab8a134f17279b0ccb29a794c83e9fd
SHA2560156ac7e06d85138216c739f7bc5ba15fb40b4ebac9ff725994e571e2dee5a5f
SHA512957715d99b09cfe3597df3a350b976e4152392be2d6db7d05b4ef0e4cbd4746ae718ffbe6230b537c593f3782dc2d239af0cd82d71c93981968d64051be26471
-
Filesize
2KB
MD52f18402cd306e65a22c0442cd5b7605e
SHA1ee9433a6c2e30e1893ba6a8df86fe835a5ff4bbf
SHA25652c0125f5a29ded5e9640c4a6dac6d5c1ccb3c8333830d106c372b4520b5fcd9
SHA512462ab23bd518da0fe490c918b550019ecfeba58911c0e5895c0e4fbe29045615dadbc1b0260601b751844c2814ffa0d59067ee173c0556c6c9503b8cfa35c3d2
-
Filesize
9KB
MD517e36c5c583ecf645caaf807f4ac8930
SHA10da6b11579051d075d474499f6d5e485d5d17c3a
SHA25653785c74ba707d4a91cdba9d5242c75f8f406cc5387c9e39cc391aac06e533ed
SHA512cbbc702c498522e8847de348be1bc7a91e393d49d86c9609826d498f773edd4c4be4d8c8bb75966aa5705ad2d52962a628dba1cc812a3526aa7cf19eb9516ed7
-
Filesize
9KB
MD56433e90d2b7bffec4688d893e6f8d01b
SHA1bced7c9a9757db4adab72a9e0f539b040f04e078
SHA256b2720a131a49fb9be3750fa0b7cf453c1161ac28054585bffbc759b80c29b6b0
SHA51229bacbd61ed730b031d1129a0f639452e4b0aa0caadf0e4edd99bcdeb0036dc1b1536698c58a83d1a77ef5cc5e345842cf85f75d1fafe7fa734cae59dd7fd2a6
-
Filesize
11KB
MD56f8cce78118e6972863703eb36ee8562
SHA1e03a3fbe09672fede41fc0b6554cd005149a6c93
SHA2561f0d726be0b73dc6e344c3457e44a04214c1e2ff7ff1b37855e51f41aee60547
SHA5129ffa37e8ac3cb33486e72f688890a8bd1e68bf159448052923ed3a3ebef58ecc7bc5c0efba3135a62e839582c87871943de304338f28034a4acebf9280f6810c
-
Filesize
9KB
MD5e3ba7caddd6c82d1399b88de5104a24c
SHA1d08cd43e111098e0762b35143b2beba1de358050
SHA2567dc9432346aed63f434cdce372566adece6d166e56dcf8877d40244154d74d82
SHA5124ca60d7c54e4a74290100310a4c3abb5b8dcc8e87ae6380b860ac5c7cb1a51f7e2b50e29cea7d64e7f1c5c904ca502610e1027d3b527ffc6f3a7c2bc4a8347ea
-
Filesize
10KB
MD53ea43219e169a15b820dd4f89ac67954
SHA14fdb3e852b89b22ecd63f98c61b0bc968d55daeb
SHA2569a56ab6101bf69b6fc1b0aa0e44efbefea68ad9e3058615a9575e32e627c62b1
SHA512509cd588ce36978731809335b93ae24fde1ad44a44e004bc700e4d907b32aab8f3211b27967f0998627ce307cb5f85332f6c4c980888e0d4ce98a3f013fd42c3
-
Filesize
10KB
MD5e5809a25aab1a60d4aec78abf32f792a
SHA1dcd06d710af50edd66b2215f7270227e4489c6d1
SHA25603627b03446f4916f94f060538bb8f045fd8cdca24ee64a51f37b6c4a6c5ec5d
SHA5120c8c38dcb06467721fe4c9d89dd47e0bdf0d0a49a542779fc7b70917a69cc4c03f37eaf73ed4918ed16da4c9b5d9e08018bd647ef2fc0c8970c7b5f01a50273e
-
Filesize
11KB
MD5c3af0d65574245bcafcfe043c8cf596b
SHA153ca7ffb2e3afe2133441abd8ac8d0e9259bc030
SHA2564b663df99c68a7558afb05cc2abd330660d4e717e10996e86440e5af8cd4d983
SHA5121505e6335d1ecd8be9631fe133c6ad2955d6df77eb048c3acaf8666aa7865c290908a74102263a567855fa45641ed18121b51d56a61505761821a3ca2af94feb
-
Filesize
11KB
MD586808f61ea897217a77ad129d1363ab6
SHA1e91d9fb91cfe3cd91081f5eba423035e725535e1
SHA256e490e5c641b6f8f432964c7b5a00c2c225f688c3a23c801f77a1965fd4aed052
SHA5123310dc001765e4ad245bfe76b05225e6f1567da12b49de4207659c0da24c0cdb9ac92c31eeb916ab308b9c3c1dfedaa6490a465606548f31af247500e2725f67
-
Filesize
11KB
MD5989969d8ec308ffaaf5ce5a2cf6a812a
SHA1bef62eb61f2bd85494fae82a18c67b330584580f
SHA256eebc770952047b76682857d5922e3bac1eaf2f1ce13a30f4eb847723848494c2
SHA512fa1b4a5aa1ac52ef59ea3297c5b648257f206ee8ce6e4799b851ab6b6b14f15ba972756f0937ac51ba1443ed85424dbdc0561b837072ed9f449172764ee043cb
-
Filesize
11KB
MD52eb5de1e54df7f9857f3283bb7444bd9
SHA1419ebc5768bdb328cbc47cf58045b0dea60edb84
SHA256243b8b59773ba40fd4307f2305a049c802d276b16de76c2760f4041c7b981002
SHA512a9a0549f75f0ee5fd5cb04c57d0854c5b3e953ac99ba03508ea4866bf60039f4c761e84a2bb01a0346328d7d041e946829f3b58471551313823cba1ca3510f04
-
Filesize
11KB
MD590c54a5a2bd76ee24cac5c1da3399c59
SHA11e7221bd3cced7968693b4cf5544ef20384b86a1
SHA256333cc7d26e30f2eb9b4618c18a2f05a2a1d3e69b9464c895572bb14c31ef347a
SHA51287c6dd63907a5d2d809ffe173312e3c604379b801f160266270f9338bbc816e89e91564b9f9615633b89acb6c43de6f6c5a64a1e7d07b9c33ea9c769a2870fe2
-
Filesize
9KB
MD5338a28346e12a8242f950fc9a7fcb545
SHA18ab0159ca8677ab912b46f079e56e19b73887a32
SHA256181d24e080bea1d4f11e0570b9e76ea29d236cf123abb8b9d3d03c01ea4d180c
SHA512ac56e46758b476699434611604db18b42e9167e0ab987a29347d8759d9a1ab50b577794ef04e86f2986860e3fc9da82ebb101db74951357023026de3f2e64dc8
-
Filesize
10KB
MD50dfca1f0b31b5839de989fdf41931fb6
SHA127d73f89c89c3719a613feca5da8ddcedf1cb9d0
SHA2560a82e46cc4f422e31c5c9917b0b9050cffe496f14a9f1d633d637e826fe1ce39
SHA512e4fdacdee71e6160922a10934467f15d1f6411f85109d5d4fdf58cb76f577897890de3765fb56a832c36150543fdd0372a166b557276fc9d2d6637bcfa9f5115
-
Filesize
11KB
MD599ace6fb1807866a5362ca4e814e4f6b
SHA183d4612ffaea8e9b93416f310864308fc55f07eb
SHA256965eca09e0e1c3e7c35a20227ca0d281bd376b8bc75bc0253eeb9a4011219d5b
SHA512d590d487c85e7444c13d7bca64dcb022d3c93121e2cf051f4fe3580e23a8f410f6d0122c1caf3b6cbd84bb4d386d218804bea87b252c8a8d9f0ca381d46f3bf7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5c0adad78dad7940ba8c79e1f011bf2b4
SHA17c5697e257c6449831a04f180a4c94afa2e6c232
SHA25667bb7d0c3a11897be4cb13f8a549eed1afbff54bdd92895262cebbadf8bab9ce
SHA5122232eb6ae9b2403af320fae64785bc37e9cba5ec1e4acd251b2997a681cf2397b6c0c5837f0fb7e4069cb9543c9d4da04b3d0a32c30a4cf34c25659f6a94fdb5
-
Filesize
118KB
MD51207424adf15893bd397c23fca33ac4d
SHA1fc68e8ce73f70913712ff489e447c9deeef5ccdd
SHA256ad980b0cc84152f3165b40ea5fe1f370e22888578f25f97d9657265f968baeae
SHA512127b7972b436455442a1fb0d301f1340000c8f529f9fe9060b66688eacf22519726065e2a321ab793654c90ff00fd7425e385aad66118e66e4a466ddc344ca94
-
Filesize
118KB
MD5410ce807f719407efc5a4ac379f33b41
SHA1ac30b872c7704782ffdeaf6cf822fc6ce798532f
SHA256309aa5074ec5f6401691bc6d7b1afc4792aa1eb70f7f6f4075aec0e6188db53d
SHA5121b263ac69c52cbacfa7cf0c52d27f0b1e9f1170950a868986e60997cfb8fb56056c8e97d15af07d2a368a4ce6e5f6df37255fa6aeaa4f5e06124fe1810d37281
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6