Analysis
-
max time kernel
161s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 09:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/iN9RXLaA#-p17M5OrKTA9uh2TWvKrD9IhOKXBK-AQl4spSERybEA
Resource
win10v2004-20241007-en
General
-
Target
https://mega.nz/file/iN9RXLaA#-p17M5OrKTA9uh2TWvKrD9IhOKXBK-AQl4spSERybEA
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Templates\\explorer.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\", \"C:\\Windows\\ImmersiveControlPanel\\pris\\RuntimeBroker.exe\", \"C:\\Windows\\Help\\en-US\\WmiPrvSE.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Templates\\explorer.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\", \"C:\\Windows\\ImmersiveControlPanel\\pris\\RuntimeBroker.exe\", \"C:\\Windows\\Help\\en-US\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Photo Viewer\\fr-FR\\winlogon.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Templates\\explorer.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\", \"C:\\Windows\\ImmersiveControlPanel\\pris\\RuntimeBroker.exe\", \"C:\\Windows\\Help\\en-US\\WmiPrvSE.exe\", \"C:\\Program Files\\Windows Photo Viewer\\fr-FR\\winlogon.exe\", \"C:\\bridgeHypercomComponentHost\\mscontainerWindll.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Templates\\explorer.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Templates\\explorer.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Templates\\explorer.exe\", \"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\", \"C:\\Windows\\ImmersiveControlPanel\\pris\\RuntimeBroker.exe\"" mscontainerWindll.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 424 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4216 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 312 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3084 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4188 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4788 1036 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 1036 schtasks.exe 88 -
Checks computer location settings 2 TTPs 26 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation mscontainerWindll.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 26 IoCs
pid Process 1408 loader.exe 4300 mscontainerWindll.exe 2240 mscontainerWindll.exe 3236 loader.exe 3744 loader.exe 2364 loader.exe 3116 mscontainerWindll.exe 4068 mscontainerWindll.exe 1088 loader.exe 3420 loader.exe 3556 mscontainerWindll.exe 5072 loader.exe 3256 loader.exe 4680 loader.exe 4196 loader.exe 5044 mscontainerWindll.exe 4024 mscontainerWindll.exe 1528 mscontainerWindll.exe 3256 mscontainerWindll.exe 1336 mscontainerWindll.exe 3116 mscontainerWindll.exe 4864 loader.exe 1476 loader.exe 4620 mscontainerWindll.exe 3920 mscontainerWindll.exe 1532 loader.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\Admin\\Templates\\explorer.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\ImmersiveControlPanel\\pris\\RuntimeBroker.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mscontainerWindll = "\"C:\\bridgeHypercomComponentHost\\mscontainerWindll.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Windows Photo Viewer\\fr-FR\\winlogon.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Windows Photo Viewer\\fr-FR\\winlogon.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mscontainerWindll = "\"C:\\bridgeHypercomComponentHost\\mscontainerWindll.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\Admin\\Templates\\explorer.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\dotnet\\host\\fxr\\RuntimeBroker.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\ImmersiveControlPanel\\pris\\RuntimeBroker.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Help\\en-US\\WmiPrvSE.exe\"" mscontainerWindll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\Help\\en-US\\WmiPrvSE.exe\"" mscontainerWindll.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCE72A92DF64484CDD88D1D021D7BD6C0.TMP csc.exe File created \??\c:\Windows\System32\kpkopw.exe csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 1408 loader.exe 3236 loader.exe 3744 loader.exe 2364 loader.exe 2364 loader.exe 1088 loader.exe 1088 loader.exe 3420 loader.exe 3420 loader.exe 5072 loader.exe 3256 loader.exe 4680 loader.exe 4196 loader.exe 4864 loader.exe 1476 loader.exe 1476 loader.exe 1532 loader.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe mscontainerWindll.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\cc11b995f2a76d mscontainerWindll.exe File created C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe mscontainerWindll.exe File created C:\Program Files\dotnet\host\fxr\9e8d7a4ca61bd9 mscontainerWindll.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe mscontainerWindll.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Help\en-US\WmiPrvSE.exe mscontainerWindll.exe File created C:\Windows\Help\en-US\24dbde2999530e mscontainerWindll.exe File created C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe mscontainerWindll.exe File created C:\Windows\ImmersiveControlPanel\pris\9e8d7a4ca61bd9 mscontainerWindll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133757042984574792" chrome.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings mscontainerWindll.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings loader.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4216 schtasks.exe 312 schtasks.exe 4588 schtasks.exe 3084 schtasks.exe 4960 schtasks.exe 2004 schtasks.exe 1596 schtasks.exe 1504 schtasks.exe 4188 schtasks.exe 4788 schtasks.exe 380 schtasks.exe 4772 schtasks.exe 4956 schtasks.exe 4864 schtasks.exe 424 schtasks.exe 2364 schtasks.exe 4752 schtasks.exe 3676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 1408 loader.exe 1408 loader.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe 4300 mscontainerWindll.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: 33 3252 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3252 AUDIODG.EXE Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeManageVolumePrivilege 1644 svchost.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeRestorePrivilege 2384 7zG.exe Token: 35 2384 7zG.exe Token: SeSecurityPrivilege 2384 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 2384 7zG.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe 3352 taskmgr.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 2964 OpenWith.exe 1408 loader.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 3236 loader.exe 3744 loader.exe 2364 loader.exe 1088 loader.exe 3420 loader.exe 5072 loader.exe 3256 loader.exe 4680 loader.exe 4196 loader.exe 4864 loader.exe 1476 loader.exe 1532 loader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4516 4380 chrome.exe 84 PID 4380 wrote to memory of 4516 4380 chrome.exe 84 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 4320 4380 chrome.exe 85 PID 4380 wrote to memory of 2536 4380 chrome.exe 86 PID 4380 wrote to memory of 2536 4380 chrome.exe 86 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 PID 4380 wrote to memory of 1504 4380 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/iN9RXLaA#-p17M5OrKTA9uh2TWvKrD9IhOKXBK-AQl4spSERybEA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff094ccc40,0x7fff094ccc4c,0x7fff094ccc582⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4536,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4904,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5044,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=964,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3320,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5868,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5940,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5856,i,15473175931751201571,7105633002917873146,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3724
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x154 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3896
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2964
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2416
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap14694:84:7zEvent86211⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2384
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ИНСТРУКЦИЯ.txt1⤵PID:2272
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4300 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m5ry2uj0\m5ry2uj0.cmdline"5⤵
- Drops file in System32 directory
PID:1428 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1C77.tmp" "c:\Windows\System32\CSCE72A92DF64484CDD88D1D021D7BD6C0.TMP"6⤵PID:2824
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qE7VszSitn.bat"5⤵PID:2740
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4908
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2400
-
-
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost\mscontainerWindll.exe"6⤵
- Executes dropped EXE
PID:2240
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Templates\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\Templates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Templates\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\dotnet\host\fxr\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\ImmersiveControlPanel\pris\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Windows\Help\en-US\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Help\en-US\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Windows\Help\en-US\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\fr-FR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "mscontainerWindllm" /sc MINUTE /mo 11 /tr "'C:\bridgeHypercomComponentHost\mscontainerWindll.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "mscontainerWindll" /sc ONLOGON /tr "'C:\bridgeHypercomComponentHost\mscontainerWindll.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "mscontainerWindllm" /sc MINUTE /mo 14 /tr "'C:\bridgeHypercomComponentHost\mscontainerWindll.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4072 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\CFG\RAGE 3.cfg2⤵PID:1056
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:3116
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4700 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:4068
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:3556
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:5044
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4312 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:4024
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5072 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:1528
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2196 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:3256
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2384 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:1336
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4196 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4732 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:3116
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3352
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4864 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:4620
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\bridgeHypercomComponentHost\AAJff1lG8RICXs2A4EYTaC5p7dZ23zLFBkqYwYWng.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\bridgeHypercomComponentHost\mscontainerWindll.exe"C:\bridgeHypercomComponentHost/mscontainerWindll.exe"4⤵
- Executes dropped EXE
PID:3920
-
-
-
-
C:\Users\Admin\Desktop\NIXWARE\loader.exe"C:\Users\Admin\Desktop\NIXWARE\loader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\bridgeHypercomComponentHost\u95boq3b7HFvqr.vbe"2⤵
- System Location Discovery: System Language Discovery
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5f73a1acbe9d4c62317a4f366c1824f36
SHA1fd9e1cd456c92bb2f7cb2e838ad233209f07c217
SHA256f0849a224717bce179c9e293327754ced9ecc080f779e6e5c699009754ea0bd8
SHA51235e215b533b440579fb836cce2c97aeacb18959cca29ade90c3809d6a4b635898723509526352fbc5a7d0459e072cf23f32b834d51502e553f02c0cfcf811f6d
-
Filesize
649B
MD55025d5a6819b298b518040d48069cc2f
SHA1f746119a77fb261ebc0d360231c68087d8592be8
SHA256a04091d2fdedb2c11586aa1b0152d3aa0412d1c654214866bf7877d53ac6d126
SHA51251934a656686a18be7eaad798f6c1c16d09fd82a4a7e73c755b7b542d2a697caa4c52a282bb01b546a95e1f3d55143c400f58e124c54628a6c7ad81d7b34f147
-
Filesize
120B
MD5efe7c247f4f6e34783ff94d7aa0fc0a3
SHA1352311e0084a58b5c02e8248eb286d98f2ef5900
SHA256224d90e57da299305d1a4489e2afe699f6867ed925409145ad41abeddbba923c
SHA5129030cb6b06007600e5a78f30f9d2e7da3a87aa3571868f30fff6f8af02dd727dc276c5bc93e9c0a92a6e5c243c75b1a89c9101f525a222bf8cc7cccaa1e24a76
-
Filesize
576B
MD539634694edeef1e38b0527d50a1a0a7d
SHA113efce50646f96b902d18e012354ba8bc40dcefe
SHA2562e511585a1b27d0e24b9938fc239ae543f28012fe6e4b46ad7b40871736048ed
SHA512dd3b7c07fcd4af21d4e75a931be9c97643341f1d2cbaff189fa47b03fbee718f425dfc842a37bc72ed200da1a1800e5a7853efd4d4b02a71dba7231563357520
-
Filesize
264KB
MD574529e249d853574ec71680942494ad2
SHA1e7ab3bf6e66b10e8bda436ab62fba03efd92dcf0
SHA2560c5b495fef55aa0cd245e414cd9000c661d4eae44efed4930eb67f864a5dc96d
SHA512afa7842a751ea05c9c2d94b238cb464ed2f1a6b558d1ea564f200cdfc9397caf7fafad136bb8eca8b30681644ff7d75e11278f5de9efe4b6e925b9da082b6752
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
20KB
MD599a2b0abea7bee55efe0198f67efdf2a
SHA1dcf92e709a3d8b7d234f3cfebf6a0a8219cd297c
SHA2568ba9a97d157ee740282887c9ad9f5f9fb50845c3a86bc65444d4bc005627a5ee
SHA5125b7234b2a25802eeab2df6163b5abf4a5ce70e6abb50f698df29d3fea68d58f9360fa8378491a1b81730ee195d6b0a56fbdba05bf1ce05ce041ac2c441ce6e9a
-
Filesize
1KB
MD5944fbc06e5f8787f66103ad82490754e
SHA16823b399e34f80bbce15d6e6a107c6767094589e
SHA256db3531fd5ef5899eb415de28d9eb43d8ebb9bedf852ccdf19314d9c31b529766
SHA5129da54f271934548be31f156aea15f371df8a81eb7ad5ff0f05b128bc1cbf7b7ee738573d82e72357ea951d64f55b338c796841ddd9222dfb1661097cc7877cd9
-
Filesize
4KB
MD520f39b255a8880fd5f51e59425ab1637
SHA114ceafb1e37950ee04d8bd9aad9b1bbeff5ce0f1
SHA2562ccbdc1f93d9d0f62a9c7a727c5d0cb5966d4e0760d69028b8a393a7b1357923
SHA512b9c5bc4b59bd569f0fa7ffb9c982d852cb4eac79330179c7ef5b37fd74f51ee22aa32921f72c2676698e5c4b481f3687f6f3ddb96d265ee1665cbe0a5eeb4c7b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5de5e8ece0fde454a81e9d845bde1f9e9
SHA168f9050e5bdb1fac7a35612121828a2a7c6f74bf
SHA256c9e3aa6c20dff6968a98193dfd451c7eb2224357be67bb1b962fcfcc78238e04
SHA51281c7200fa2909c124defed6394b7711bb79d4f17005e1972a6fec60ff9c80d266d0ed266536b0cef4b2bc5e187443001026ba729acd048e7e9b3b6862f5ab5b4
-
Filesize
523B
MD5c109c5999b5ba873223f02f1f483ff94
SHA1327d7b22679015fb01509a5c8818576b2f64ef12
SHA256d584fe3e02d3c7c4c1c15a17adc8dfd1db1b0c8cad23c4f81f4b27ce1c15fd97
SHA512ef2f6178fed06bc157a48aa21bff5583f872e5fd311e2cd48c932d3872d718f4af7c5f70317047f8468e4a330870cde98eca304a59c2ec9b38f78b5ca471201e
-
Filesize
523B
MD558c04726eec73b637856b7c53d5c7cb3
SHA1ef288e751d200342b0bae6bb7f98c2e2406acb98
SHA25649f2c1da6a5eb9bd5384991b8e5fe6de2cec63c421d5ef4f6b4440700f37d0fc
SHA5125f984ed1851c99823f6e889d5e860ae0bcb6f52af279d352550689479e7275f014bc1e25116dfe3543a9d40655da239d632c4b9a6140bad8c4ac4fa537993da3
-
Filesize
9KB
MD5688526e09621ef1ebcc2982621560328
SHA194114a01b101fcd0f9982334ab680816141bbd69
SHA25614c0953263b0b841885238cd4ed43c927a9f2161275dac04262c17021c5ec3fc
SHA512936c24db5b7f71f390ac2206e1c1f9d22762693729bc5ec0a33055c9afbf50f0baa993ff16aef2c0ad314fddf139a3706b6bc96d1d5140e60507a9ed5c8ce65d
-
Filesize
9KB
MD5e9e352f428e41ae0301d6a499a453c7a
SHA1dce4f7f2ac96b40e9779d736b2f81f6d7a6598d1
SHA256ef94bd06086827f3bc24b22c116763403279a3b11e6313925f630752e56c4130
SHA5129f4feb7d61f23ee7f8e91f77b1f26ddaff7e9f82b52673f1bbdeda3889c851f91980bda28281f205fedeed0be398f6a233751ff0586a4c0c86163f319dc7006a
-
Filesize
10KB
MD50dcb85e38c2ed16b9356f5c8c90cb0d7
SHA17ec1c6bf533d847ae7a8cd53658635062986e7dd
SHA256c4067a9ec96eb9e0b72935f68f6f8ea297c7a94d8ac8a8fee41718fe66844669
SHA512e7ba53b749613a5403073e328fef3469c1774aeecef679510f09e042fa84267dcbd092cedcdcd9d62a26dbd94ab63af5fe43d6c0725ed13870806de4f4d7d2b8
-
Filesize
9KB
MD58c9a096698b9893c3dd1819ab630d021
SHA1ff467c177a6072cd794a85d5302aaed9af84a39c
SHA256d603f93c1839bbbf64e6320bdbc179e4cf7527511e1198a47d6945dc32e866e5
SHA512e4395bda55ebcd0e770cf4b73b91a33d3dc38fee18024ce4c2cf633c5c956667c5fbf2f47bd5ea5375216dd164db95af91f701adcabfa81a1e108e3e97333d27
-
Filesize
10KB
MD50b3bad62b1f704a822262af88591c50b
SHA186cd958b55e2ece146e9deb28c5cec7c0e82f70c
SHA256c1ddfbb560463d8d242025617eb4fb835a5cb34643155d546767380a12701800
SHA5129cc3df4d4397ae517b3dc279f491afcd148c1974573b4c28cd476d2f3c2203cecaf011e0c9380720fb8fa11396ae17c9dffb80f3e4ae28071b2e71dfe51102bc
-
Filesize
9KB
MD518f3207e1dcb1f5472795cbf646da03f
SHA18fe56e1b46ece9215586ae56f988f3de5310b8a6
SHA256ba487085e7ca6e810da57a821d3b2df997d7a59167f1ccc5e4f5a6c18032c40d
SHA512969ab1b813daa94ed7a83edae7035ba4d39ddf5f6ccd3f80dc3dca151fb10ac2c8b08f3dca505f0b2a200e3f422b977928fa95a364694c3a7402000cc14126ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5f0693fcc90b1fa391248896b2d38e973
SHA1d3361eaeebecb1543dc8f09871d95da61e0bedf3
SHA256bd88b476d89256391ebdf59eb075e3f796e26f0a3a23239e7ce66765bb0ab06b
SHA512a84cb9abb79b718ca8cb08c0c94858ebc3a01d25ead731bc2f5ded34e5a012759dd3f7528d77daf4c62a4211f8b43e4f7d95c5067be99a595fa5809983ccd08e
-
Filesize
114KB
MD59a637405c600a38f7fa85ec5627c5338
SHA15fbbf93049f473caab414dc5f3b84acf5d6d60f0
SHA25613f66e0b9e0b796724eee785c71d037bdc55bb0972fb22fa6bdb79035ef75379
SHA51203ba3f95e9f4c262286ac43768e559f2e89f6180c982b49dd696733f51c022da4f71eecb51b0f106d96d2599a50fce26f774d6dddcea0a2c35bbd35620e1b727
-
Filesize
116KB
MD5bcad59b3c7d5c2cd596f256f2a7919ea
SHA11d0099cfb0f141c0c3f18e0a9aaf08240b55f234
SHA256639139f8e44afce7f40985ebb86e03b51691dee194c6e7c73d49250848f461e0
SHA512c80ddee7d25d96dac6d92c513bdac0098f39ea52bb30235c8bed3a1a5cfb464805dddaf6a66d4aa11ffc73f7d8b2618134efe20d5b67a71b97df606c098285f7
-
Filesize
116KB
MD5e016d220c8b0d0427c0f11a3d1e024d0
SHA10a25a72fbc6d6367583e8f4612c3a253e3fdd6a3
SHA2566ad43bc124a16cb1df79dd928eebb3135488c7df3e683e46bbacde50b78c5d52
SHA5125638c5417bf04e8637635f00ff89ef8577bafc27a5969849367373d0f340f383e4a4beb963eb0c403f9719ebe11a0d2ce28b5749bb26b680d581cfd6e9cc296d
-
Filesize
116KB
MD5ca3e276ec265d437a6112aae8bfac70f
SHA1309658dd9448729b18e74c05dddf939113a99add
SHA256a4cca994d6bbe512bf126640385b68fdc166e31c5a86fc8e5793feae50c1254f
SHA512ba08bc0c2a2323c490f46907030a298dbde65a00ada6cb3ae1027dfc11901c7034c510921aba29ded06cc0ee3e6c3e77100169549904ad36ebaa93b98a1632e6
-
Filesize
116KB
MD5265991081b98c03068b5bec27a6de086
SHA1d2adec25479bafc9752527fa1877ac97c70a90c3
SHA256e035703b370ee543c22ce6bec35abfdf53ba50466856bfd003a11faa5876f1e0
SHA512d8dc319d83b671d969453d6b0c89fbc59da20b6daee793cf35159f3071cf799434cb86f3eb66f87fa64f545520af4746f96967d29245246fc08eb267c22c2407
-
Filesize
1KB
MD5af6acd95d59de87c04642509c30e81c1
SHA1f9549ae93fdb0a5861a79a08f60aa81c4b32377b
SHA2567521ee2d065a78efcab55a194fbd78492f84b70595f139263875f4ea92b194d6
SHA51293ab99bcf588fde553de3240e0d2b0cbd4e4bc5ef5e99d53f45a267d7ff30103a80b5a7aa1c52d6eff1e070af0ec82d2c0b8aafb7099742aa16810edc1815c3a
-
Filesize
1KB
MD50d9a352c461d13a0193d935bce3cf759
SHA1a02448f65c8798920dd04fb4c3b45c08f7c177a0
SHA2569d5c4c524d7d3d812989e361c864fe4db4bc8a6f6fe553110166d8b71c3e0784
SHA512429327689c15c2b40001405f2957daa30a316d720e0077c65b7e231742487ed3e22c925efdf4a4febe560977f49f770e62f984f128016ae2d1e9c598e2cf21d2
-
Filesize
228B
MD5771a47dea45411f02205d7df4ab202fd
SHA1b77beb2416ea123f61c98f86b7325eed1158dd8e
SHA256e673a8381c9970dc04f03bad6bfc725d33ee38af33bf6f1f24504042ef695068
SHA5124cfb63f5754ea5ea1a8f9dda3ac30325722e0999ef118f09f5974c1977ced37cdcad4378dea2aa0b2c0253fdab80521212f7d2b737fa8e1e328d5f0b031aaa94
-
Filesize
6KB
MD5a2fccb87bdcb14e855b1b51ef9e81f5b
SHA1b9536805e6c8255ff34d540c748e09b57a8d5193
SHA256262acb6a1133e5f229c1e59ef83e17fece5aae4353c967c031c0ddc95d5257bd
SHA51276e78e9085e980c01f7f2abe9aae5571dd5c716023b77fc63bf8364d7f603292024d3091924e33d807b0330500207dcab71d9328e44a8eb83ed183992cfde15e
-
Filesize
3.2MB
MD58faa9e2bbcb1f98cb3971b94f9feda41
SHA1ab03732cdbc58c752057f2dd3c39e164e222476f
SHA256026825e9ca81fe52b1833a5e2c838336bc645778da89ff5c266c65c9d750a490
SHA5125a660bddaf58c15503861663d018e3444c40fc9a62cc2953a60e41c78561014db4911d4f1da80f70a492d6ff912765d93e08c3c39fce921580b034dfcc47d358
-
Filesize
153B
MD5e5bf3c592fa0a8639cc9d6c3afcfe101
SHA14edd2164926a8726069f360a91a33725c34da48c
SHA256bd8b97d57eb446afcdb4d046b44417daaa4380d052da59d036528b6ea9293d9d
SHA512ca3a1fcd7b11741dd29b1244b5103f3ef7e182b312e9e237e158c87bb0e5720e19044f22e98385a8e6feb0b33ccd689cccf55756b1588151de48f28b97c761bd
-
Filesize
2.7MB
MD52b2957e283af18531e63cab123079d3e
SHA1a9f5c70f85becca9b7ca60ff6389ca3d023f858c
SHA256bb107d0ce375bd8c74e1c57a4ee0e67ce80a3e8de84944048bde248d81f7ee51
SHA51216c36326eb62ae3acb2e731de1b84844ff574a41b88d04ef8d185eb05bccc9f8dd67a5343960d41ca8e85f984e35fb9da3d6c5a1a26bec35d748fc45fca79dd2
-
Filesize
108B
MD5836fc705ac99bb9e9c32457cd334e13e
SHA1ebbb2cfd6a3260e482447d1c7871391ea8c75551
SHA256e0446f377405745b3712c210adeda645441bc9f6b987756b53aa05ed167fbf9c
SHA512ae2915671fee13ce19947eed0733d3de5b462ca8ef55b422259814004cc51df54a1ea58a6659a36a886103e84191f93fee5d7a134a50439a81c856645f88cc90
-
Filesize
1.9MB
MD55a7bf976e09d1835a65809093075a1bc
SHA1d2de32c02c3d6e79f185b6b5f91e95144ae5a033
SHA25620ea6e36a40896c99a0549118ac01b9508dd72b484050c9b2ce4fb5ac805a950
SHA51260c6f582e29415186d2fef58a469a6bd87e84daf084d8705f09605f331d015abb1a825d06343a797532561915e754015692e745de21c55ed6e52cb5ba47129c6
-
Filesize
246B
MD5a672021e4678a1cee46a924baa63411c
SHA1c4c27bf73768a3cc97d070e3d560e4f45affe9b4
SHA25665a576bed74898f83fd527be9a715aaac80609066d01e8b16a691c5287bd15b5
SHA512ea08511f0859767abdbc080e7dcbad20bced260cfb2b58ba51cc8d48d544fb36256f56887c25763f25d799fa225674d487d6f5826f835fb8462c0c6441c64b67
-
Filesize
4KB
MD51d7607f017127785541d8927ae59c8e1
SHA1a51a5ec64e4f696c64abbffd837cf65b849de84c
SHA256db832702e50b8cab3ab357eed4af43eb6e73188a7c76e1385681a949be6a1d07
SHA51216178241094435dfc2d29c6d67c0223713a2cc8478e8d1dbabcb1e7e9f16fb3c2f2c22e97d4b8f674d9d4ef52ed92ef3c623326b0dcd2faff515bb8d474df7f7
-
Filesize
369B
MD54adb1a4f672f37b652ad372203dccf9d
SHA18fdc4716c03d924e4797fa63cde6d38dac5967cd
SHA256a420c5df3ddd020aac2db38d861c83ea826efda6dc2baa0379e2a0a3b811dfbd
SHA512f9a0958ba1b34002121e5a6a813fac6f0407ba9ebe1748c6abfa8098b3f95b53579e2782458fd159d81faab39bbc8f6d155dcafebc26e4a38156d83a8445ecd8
-
Filesize
235B
MD595f9fc2b9259211589815a5d2825940c
SHA11a33ba5f061e7ec8d5cb85d5c2f92e3c85025fc1
SHA2566964cb22fad6487cc8d37e1c358f630f3275e784f30160ad952560a44a91cea7
SHA512be1bd2e2cc08aabb44f0d6a00c17d06fee375b0ef0767e905d65aab6548086b14777805f307b58b6c44b0570e6e201db35538eecfa0b95582135380e983d93cc
-
Filesize
1KB
MD57bbfaf1199741b237d2493615c95c6d7
SHA186d466217c4dc1e0808f83ceda8f4b4df948b5dc
SHA256e20e4619dbc932a216fd93f86fe0af2e915f4c2ba6177fc3581da59885094476
SHA5122eda9bf71dc4a4583b7b8e9a6aab0f91d98cca68ee4309df1a4d26541917678da09a15d712397ae4b95fe95b65c8aa6eeab94d7620a5546b3df6c00306ef4a5c