Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/11/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
Facebook breaker.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Facebook breaker.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Facebook breaker.zip
Resource
win10ltsc2021-20241023-en
Errors
General
-
Target
Facebook breaker.zip
-
Size
1.2MB
-
MD5
60baabf5f07b439be78195450dacff3a
-
SHA1
4c21ad0c866035b9cd720c904c07d6d5a9f47a8c
-
SHA256
8f379aea1158c492af7bd6361b1b0c8e5b4d2c73062968eb3231da123c4160df
-
SHA512
bf4d9b38a0575b7fe0200e3145cabd934abf3abd7192f32080c248b847787de724bae8f02ca6df207f75d4557270f8487e87bcc6100016ac27c5bfa61e498fe1
-
SSDEEP
24576:sPhAekqOX+cSocIXNgg3DZ0dgBBFegQHfmrcFebKpDH8pZJfXm5gQEd:0h+qOOc+IXPDZnFeQrcUKpDcXm5kd
Malware Config
Extracted
quasar
1.4.1
Víctima
crismulticuenta-30512.portmap.host:30512
d7480f6f-e85f-4b68-8813-8279e2e6cb96
-
encryption_key
8497DDBEB7064872EF356A0D1A58DE488578E1E0
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Updater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral3/files/0x00280000000450a5-2.dat family_quasar behavioral3/memory/4252-5-0x0000000000820000-0x0000000000B46000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 8 IoCs
pid Process 4252 Facebook breaker.exe 4644 Facebook breaker.exe 2296 Facebook breaker.exe 3548 Client.exe 1656 Client.exe 1780 Facebook breaker.exe 4872 Facebook breaker.exe 820 Facebook breaker.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133751760039787481" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "191" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2564 schtasks.exe 2168 schtasks.exe 4368 schtasks.exe 1900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3340 chrome.exe 3340 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4860 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeRestorePrivilege 4860 7zFM.exe Token: 35 4860 7zFM.exe Token: SeSecurityPrivilege 4860 7zFM.exe Token: SeDebugPrivilege 4252 Facebook breaker.exe Token: SeDebugPrivilege 4644 Facebook breaker.exe Token: SeDebugPrivilege 2296 Facebook breaker.exe Token: SeDebugPrivilege 2628 Client.exe Token: SeDebugPrivilege 3548 Client.exe Token: SeDebugPrivilege 1656 Client.exe Token: SeDebugPrivilege 1780 Facebook breaker.exe Token: SeDebugPrivilege 4872 Facebook breaker.exe Token: SeDebugPrivilege 820 Facebook breaker.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 3340 chrome.exe Token: SeCreatePagefilePrivilege 3340 chrome.exe Token: SeShutdownPrivilege 764 shutdown.exe Token: SeRemoteShutdownPrivilege 764 shutdown.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 4860 7zFM.exe 4860 7zFM.exe 4860 7zFM.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe 3340 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1900 4644 Facebook breaker.exe 97 PID 4644 wrote to memory of 1900 4644 Facebook breaker.exe 97 PID 4252 wrote to memory of 2564 4252 Facebook breaker.exe 99 PID 4252 wrote to memory of 2564 4252 Facebook breaker.exe 99 PID 4644 wrote to memory of 2628 4644 Facebook breaker.exe 101 PID 4644 wrote to memory of 2628 4644 Facebook breaker.exe 101 PID 2296 wrote to memory of 2168 2296 Facebook breaker.exe 102 PID 2296 wrote to memory of 2168 2296 Facebook breaker.exe 102 PID 4252 wrote to memory of 3548 4252 Facebook breaker.exe 104 PID 4252 wrote to memory of 3548 4252 Facebook breaker.exe 104 PID 2296 wrote to memory of 1656 2296 Facebook breaker.exe 105 PID 2296 wrote to memory of 1656 2296 Facebook breaker.exe 105 PID 2628 wrote to memory of 4368 2628 Client.exe 106 PID 2628 wrote to memory of 4368 2628 Client.exe 106 PID 3340 wrote to memory of 3756 3340 chrome.exe 112 PID 3340 wrote to memory of 3756 3340 chrome.exe 112 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 2568 3340 chrome.exe 113 PID 3340 wrote to memory of 1628 3340 chrome.exe 114 PID 3340 wrote to memory of 1628 3340 chrome.exe 114 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 PID 3340 wrote to memory of 4920 3340 chrome.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Facebook breaker.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4860
-
C:\Users\Admin\Desktop\Facebook breaker.exe"C:\Users\Admin\Desktop\Facebook breaker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2564
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Users\Admin\Desktop\Facebook breaker.exe"C:\Users\Admin\Desktop\Facebook breaker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4368
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Users\Admin\Desktop\Facebook breaker.exe"C:\Users\Admin\Desktop\Facebook breaker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2168
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\Desktop\Facebook breaker.exe"C:\Users\Admin\Desktop\Facebook breaker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
C:\Users\Admin\Desktop\Facebook breaker.exe"C:\Users\Admin\Desktop\Facebook breaker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
C:\Users\Admin\Desktop\Facebook breaker.exe"C:\Users\Admin\Desktop\Facebook breaker.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffba6bdcc40,0x7ffba6bdcc4c,0x7ffba6bdcc582⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2172,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=644 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4556,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4520,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4872,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,3667152671784699315,3465472261759846875,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1964
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2c055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD578b14f1d03e306406dac559613b7a399
SHA12522c8078bdc4260c1fe03e1c8c976074a8859dc
SHA2566e0ab85ee2ef41d213bf057f13b3e843409756bc5e61c4868124f340bb752f48
SHA5124131c5a22018bf50fb71d6bdcdc2e40349ef935acd1d2b4ce98193978f131ba02d143ddb2e2888707148ca1149fcf9a1ac68944f831f2f04aa8b283d57dd0825
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5dc974b788c9c01503c57d6fbd5e497a6
SHA1b3445bcab8799eaf98da30ddb28a7bef98ba6d7f
SHA2561108be7f1c5fb41f8b881cb516335657bbccea1cb3ddfb06e3300f9dcd154409
SHA512a6c0616af36046b7a56ae44229cfdb936d9cc0a84af561d51816ba8ba0307fc351dd7fb11cb183ccb7155382fa4376e85aca170530548ca7308fdf5e4d1624b7
-
Filesize
15KB
MD55f3a716b5f60327df03f30036db1d812
SHA16621b364f072fec0e6e32c9c16587c7253aef7f7
SHA25699739f485bc1291660f356ea9b2a9cf18ee42d77b0381ed8c944918663829a43
SHA5124d35c040e9272dc3c3a13d95ff067762b67060c87c08762034805cf2f7b19e7a1819c67f4ce2f5d5883a4507c33ae59b9641cabf60f0940b5696504a87133ae8
-
Filesize
231KB
MD5c70f9c75e0f2556321a1d9d4a1567948
SHA19cc865e3d062031d2e1ce321e458c96f1c9058e8
SHA25631de151a3a2daa6b7e01b99dcd7d5fbda9d82435010895eda033d3ca79d9b20f
SHA512202e79d3868fd13d0e7ab6bf93110ae0f1d5e5fed0a771d3be05c7470ca3a026340c0520a1dec6c4173df2261931b70707cd61fd62f58d9a3857912fd0c17f28
-
Filesize
1KB
MD5b08c36ce99a5ed11891ef6fc6d8647e9
SHA1db95af417857221948eb1882e60f98ab2914bf1d
SHA256cc9248a177495f45ec70b86c34fc5746c56730af36ace98ac7eb365dbafda674
SHA51207e62581eace395b0a9699d727761648103180c21155d84ea09140f9e1c9690705c419118545aa67a564334bbde32710225fe3aa92b0b4b4210cb91f0058b1ea
-
Filesize
3.1MB
MD554015452b4c7ca1af1e48c57d8169ae8
SHA131fd25eb9d5142f0cd3c281ce0617c9843ee6088
SHA256d65476ae21d3f06713febd1ec371f89832248bee5d8fd0717f515df2d4aad2bb
SHA5126ad3294c6eb7b12ca3538b85835ca36c9bf523b474db26268900ccee866e32067e2b2b2a872b4360c457b759de562572503c7f9ffdbb4ee836994154ec01ff55