Resubmissions
03-11-2024 15:35
241103-s1h9zsybln 103-11-2024 15:12
241103-slem9axgnm 1003-11-2024 15:09
241103-sjrj2azmaq 403-11-2024 14:57
241103-sbqb1awlhx 1003-11-2024 14:34
241103-rxqdfswjas 10Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-11-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
boobee.txt
Resource
win11-20241007-en
General
-
Target
boobee.txt
-
Size
156B
-
MD5
32ed85782dac5ad9e97eee17d5a3bf5d
-
SHA1
f40f564a3265f90a1f41d6ffcfddf1d735d45dbf
-
SHA256
35dcb543ce32c17153d4401abc5da15d8c8db7b16d72c6e6dfe993eabcc87f86
-
SHA512
dcfc8e3084551e8a3b002c62ac54b7ae750940412faff211400e27ecb3d2918392af8ad6cc00921ddf8944549e526cd539005899395af5a5227f2942b74026a4
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
Processes:
setup.exechrome.exesetup.exedescription ioc process File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133751202086824837" chrome.exe -
Modifies registry class 6 IoCs
Processes:
cmd.exeOpenWith.exeBackgroundTransferHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Misha Video.rar:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 400 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 4620 chrome.exe 4620 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2580 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: 33 1284 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1284 AUDIODG.EXE Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exe7zG.exepid process 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 828 7zG.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OpenWith.exepid process 4356 OpenWith.exe 4356 OpenWith.exe 4356 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exechrome.exedescription pid process target process PID 5052 wrote to memory of 400 5052 cmd.exe NOTEPAD.EXE PID 5052 wrote to memory of 400 5052 cmd.exe NOTEPAD.EXE PID 4620 wrote to memory of 1388 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 1388 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 3304 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 4984 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 4984 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe PID 4620 wrote to memory of 2812 4620 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\boobee.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\boobee.txt2⤵
- Opens file in notepad (likely ransom note)
PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0499cc40,0x7ffe0499cc4c,0x7ffe0499cc582⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2068,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3596,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3572,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3568 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4752,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4824,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4868,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4620,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4716,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3820,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:3528 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff78e1d4698,0x7ff78e1d46a4,0x7ff78e1d46b03⤵
- Drops file in Windows directory
PID:3516
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4324,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5244 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4848,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5416,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5616,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3532 /prefetch:82⤵
- NTFS ADS
PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5080,i,9890166113958059198,7239008659193767673,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1008
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004F4 0x00000000000004F81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4940
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4356
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:3828
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2580 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap15583:80:7zEvent29951 -ad -saa -- "C:\Users\Admin\Desktop\Misha Video"2⤵
- Suspicious use of FindShellTrayWindow
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5a808ea363a02d51cfd2fda0d91071907
SHA183e30d76c492a97132fa199e0cc8de04fd9905e1
SHA256f67e05216bf31e316815fc714b1e65fe8473a7f60359ec8cc04211f9915a5c90
SHA512eb6c0310ff157e170b3a3908ab990eb8076e8b2a945aca2ba0f309252e80e76fb8183658c1d1b50bf2971bb2dd924e56f470570c01bf3e85edecf4cb40bce4b3
-
Filesize
120B
MD5966fde8b29b5ff3099f8db6ae78050c3
SHA1beebde02766aac41125a0582ec57e49e3c8b4932
SHA256cdc34f1de5170360c086c7cb292f62be544f501d4b6937d47412fa4e70ad9d89
SHA51258270a60f9e417fc3522fd872fb98dbce264e96520da9221b8a451a3abf09b6f4f80e775bffeae54ab41fc8d2127ac17aec026e1b432e2e2a40a8ef8640791b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD5b1fea6f5bc6d6c2b7ccb2a0da8aefe38
SHA15031bfe458fef6c3483b922353839a6a1b332a2f
SHA256650cea83c014315e7bb16dfbb7573efdf542d7bc97bdeb6dd78e973aa73374ca
SHA512da61dd737c975ee4d20987e94e1cb4695504625207913a6cb77483338863bbb6af8539d0a71b5681fe3dd6e08763816c01f5eca5359a8522f6183d9b997edbf0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5435e4d31184ebc4ec2c2790523e0aa7b
SHA14fdc170241468e7fcfe771733659c14e8af1dcc4
SHA256e0e1ba3088016403d64a0dc065d8f85c66ffb32dddffdcb8c4a81b1271cb5ade
SHA51243cb820f9859f76c6ed7c87561892ccad5fcdf4aec695271c6f62163126b466a746fcd9c72487cbd7e474f138633208aedf8632fbc7dccc7007409b0e966d2ce
-
Filesize
9KB
MD5155d5f9f30bb365768086c5352506d3d
SHA11d3fb88653a4e7229b132ca58d03b5583294e510
SHA25607a79d09731305b5bc15719d849e8d5da72e1e485fbfce70ce6b93c07c259e01
SHA512e3f5a27e797397063b5605e4e8969545f4e9bce9a58ce02010b9cfba272c41b49af2b627ec99778b3ae8e20e0eab28e25410eaf5dc88b1f85d866c02b0e1f8ac
-
Filesize
9KB
MD57dfe8a9d4b5d6f58763d62622b13b9ff
SHA1997b82dcbdd25aef848b20a05db1c81e380eb4c0
SHA256a8db0db0bd4dbddf24f01aa9464884b31ea582336051d82837e4dcc68e702ca0
SHA5123e733b5b977e0d8c3179ffc08ece902430cbfce665adc191bb3e7e9ac183f9bded5b7ab63cdfb866f8542ca7b585675af1a8886c5f3e518f3fd3b11ce8e410fb
-
Filesize
9KB
MD57ea4675673efdb55c434081521f1fe80
SHA1496838c40e55b1ddf039ce9815402a049ca16bc5
SHA25646ccebe0251575df85dc2ed5c3157da9bfcf36c9a1d444af84ee9f2e0f3c1c30
SHA51293feed3c0bb9d10bc1470e8e28f6357109b21edde1f5e0b407ecae6f3b98b92772ec71c6d8feb73246524d5f2314d31251549f09363fe8f4696989294850ef64
-
Filesize
9KB
MD5cfcc747d8adf3cbd16e82a767f03744b
SHA1f7472d8151476dd94c94508a5813022da20f7330
SHA256bf12b666f24bc5712a1d424a4a2d9a03ea13a78501e2228ae2ace8851d42acad
SHA512acc0073f0e0e2ef30a175b9b1018b169d4a11db47fc8c28bcbee8f06015793144a4a234fa57549c6df13292b2e50d606d0d1adba4191cb1a4c81f282b3e4b91d
-
Filesize
9KB
MD53e9f3068f087a3f0bce89df2e70f57a4
SHA1166ff7d88089b3cea021f11af34deb42e8f1e6db
SHA25677237ad0f8af2c271169e55bf152a5e242f7de89646efafb5638d041bce09e9d
SHA51227b00c6bc1d9ba7b0cffd644bdcb6f71631707b5b17608cb5cedb07772115c6bc7768c6c178ce024df3e20fa08f0bb5fdf95aa59ca611fc97a6b507a77661eea
-
Filesize
9KB
MD51d9fae9dc42db8112b1c359454144498
SHA13f17e071bb411e76e99c56e10eb1818c42b1bad8
SHA2568b9d177179368eb4f470270caeb90ff3e15c0f78bd301bb9fbab5b612bc4a635
SHA51226ca76b619b8ec46707b463f8629785c1cc9f6d0b687694cde40bfbd95105abf2568ef4f27117db4c8ca830d67b52f22ed47d6468ad79b0998ba937bc6e943c2
-
Filesize
9KB
MD585fb346d30cded8fbf66297706875093
SHA16a4b4da6454b9a216fd864b16c16ce13dece200a
SHA25694fe0669c9d8b4e7e2a1e3843b2af9e4107d2a9dd2fc0425dc2ce442da3a5bb5
SHA5126c6dac24317ca372dfcab18faed58ef7a5ada1b7bfa809453931f7d159f62a1bb7f43f8266f4b9e3a7384f9a7c64a58c37dcee24b3d142d90989af49305f5aef
-
Filesize
9KB
MD54d266796552e13b0c51c2c588ddead60
SHA1450c0db7b7c8c49619a957dbd447db2edfedb016
SHA25698ccde6deafafef62cb2d313c564d78473d953a49199b26a70413505a098cd9e
SHA5123c821a61b77fd34e6cd89104546954a35c6a54549b4828a7bb8ddca74861db1b46fc6f56272367008664fb5b2e8a6b95c6fcf2169c7ab971385e1fee8c7e47bc
-
Filesize
9KB
MD59cb1e70d2875fb623b993a4a6de7e2c7
SHA1f02ac0ccc1e85aa546f4440ed88be845206ea495
SHA2564c2a304c2deb552e9c8ff84e15d73c7f9322b5292b0a35d3a4a7786ec45e4963
SHA512c03879bf7bdbe811977d8a68f5a48185dbc9a7c826f1df543ca1577cafdea774f54f3ba76ae4937c6574246e14cc169b3c596f99ddb313a8ac1f0f2074c80b1f
-
Filesize
15KB
MD592fc6623597064562fb36042500676fd
SHA1a74fad5edf25eb3283b9e825021cfd9df14d7ec6
SHA2563762519471cfd870f03f839886661059afe253560df69fdbc437d70b5f76935d
SHA512c2577eb363cf6628734122b9a6d5649cba7b291a995be8c9b2bc4f9b8bd158569e3742385d72d77af9724092cc6acb009b2965d55b657d0419ecda5b689ec101
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD54ae4e172582a8961f33ff9eadde2ae32
SHA1bbfe078d036831ae1e9b49c90b16d314093fbbd8
SHA2566978564dadf8a4270de9f4bb92903a35ee3101add64c19899f0ab11cef641f1b
SHA512965b91454d261cb00525c7e9f66b06b8ad011178146b9d52265da1e4e3900bdcb5010326ba528b3d84b9a61cd174afb2c19964c0e0b7f5385c4033b86ab697d6
-
Filesize
229KB
MD5e9492217064e2fd33f05a2c6d87c8884
SHA17a9d36b6a3a2003da2310d6d7b86a68466169c55
SHA256228d83ea32d19578c94041c4b4258b724bc1550883d8042828ca9e969442fca8
SHA5126a787115c29667c127819fc8d712482f35b934dad3300a753f51929fe9920da74e5a31f5983ec397f6050aa892734ca77958d87dbfd43364cb560637b1ea56c4
-
Filesize
229KB
MD55286f08350b723d29a599bdd0fafb80a
SHA127cf3019e4abdd96b0a8ef386c454869078749a9
SHA2566865243b56a9f20a0a2684f269efa3efde9a5cba9b6f6af461556fe02ce09647
SHA5127c0333edebe2a134586b504cc68ecc1c3c59268ba8401fe6ea4b0d694bf41b9fb943c12edf5917c07cedfa804c122c806e27716bfc4f135eff498b44834a0852
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\519f139d-9111-48d3-a276-b49ff584f8d1.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e