Resubmissions
18-11-2024 16:29
241118-ty96csvqcp 1018-11-2024 16:26
241118-txn7hazfre 418-11-2024 16:20
241118-ttg9sa1bnm 4Analysis
-
max time kernel
292s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 16:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://greggman.com/downloads/examples/html5bytebeat/html5bytebeat.html#t=0&e=0&s=8000&bb=5d00000100d8000000000000000017e07c448a369a0fb84fd64c3680f0b757a25bd766d62696e767c8dd550588c4247b59701e0e8da7fac3eb2ef42618bcfee305a8794a84de090a58b4c2afae4dea361455b6e322a8c5ae9d4560337fcc00c84b7d301a79c3553e3be93807fbfd1e28d151964b29e2b16affe9b8ee12a6db921233daac18f14850deee365ac8ad2e5de190238336358a2653ceff4b62a8467a0c3aff7f3758cb11042da65e8941ffff4b429d00
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
https://greggman.com/downloads/examples/html5bytebeat/html5bytebeat.html#t=0&e=0&s=8000&bb=5d00000100d8000000000000000017e07c448a369a0fb84fd64c3680f0b757a25bd766d62696e767c8dd550588c4247b59701e0e8da7fac3eb2ef42618bcfee305a8794a84de090a58b4c2afae4dea361455b6e322a8c5ae9d4560337fcc00c84b7d301a79c3553e3be93807fbfd1e28d151964b29e2b16affe9b8ee12a6db921233daac18f14850deee365ac8ad2e5de190238336358a2653ceff4b62a8467a0c3aff7f3758cb11042da65e8941ffff4b429d00
Resource
macos-20241101-en
General
-
Target
https://greggman.com/downloads/examples/html5bytebeat/html5bytebeat.html#t=0&e=0&s=8000&bb=5d00000100d8000000000000000017e07c448a369a0fb84fd64c3680f0b757a25bd766d62696e767c8dd550588c4247b59701e0e8da7fac3eb2ef42618bcfee305a8794a84de090a58b4c2afae4dea361455b6e322a8c5ae9d4560337fcc00c84b7d301a79c3553e3be93807fbfd1e28d151964b29e2b16affe9b8ee12a6db921233daac18f14850deee365ac8ad2e5de190238336358a2653ceff4b62a8467a0c3aff7f3758cb11042da65e8941ffff4b429d00
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DllHost.execsrss.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language csrss.exe -
Enumerates system info in registry 2 TTPs 35 IoCs
Processes:
csrss.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\1\KeyboardController csrss.exe -
Modifies data under HKEY_USERS 9 IoCs
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastLoadedDPI = "96" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\SizeName = "NormalSize" winlogon.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached\MachinePreferredUILanguages = 65006e002d00550053000000 winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LoadedBefore = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastUserLangID = "1033" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ColorName = "NormalColor" winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ThemeActive = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\DllName = "%SystemRoot%\\resources\\themes\\Aero\\Aero.msstyles" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2392 chrome.exe 2392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
chrome.exeLogonUI.exewinlogon.exedescription pid process Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeShutdownPrivilege 1240 LogonUI.exe Token: SeShutdownPrivilege 1240 LogonUI.exe Token: SeSecurityPrivilege 1848 winlogon.exe Token: SeBackupPrivilege 1848 winlogon.exe Token: SeSecurityPrivilege 1848 winlogon.exe Token: SeTcbPrivilege 1848 winlogon.exe Token: SeShutdownPrivilege 1240 LogonUI.exe Token: SeSecurityPrivilege 1848 winlogon.exe Token: SeBackupPrivilege 1848 winlogon.exe Token: SeSecurityPrivilege 1848 winlogon.exe Token: SeShutdownPrivilege 1240 LogonUI.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2392 wrote to memory of 1944 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 1944 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 1944 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2588 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2540 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2540 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2540 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe PID 2392 wrote to memory of 2600 2392 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://greggman.com/downloads/examples/html5bytebeat/html5bytebeat.html#t=0&e=0&s=8000&bb=5d00000100d8000000000000000017e07c448a369a0fb84fd64c3680f0b757a25bd766d62696e767c8dd550588c4247b59701e0e8da7fac3eb2ef42618bcfee305a8794a84de090a58b4c2afae4dea361455b6e322a8c5ae9d4560337fcc00c84b7d301a79c3553e3be93807fbfd1e28d151964b29e2b16affe9b8ee12a6db921233daac18f14850deee365ac8ad2e5de190238336358a2653ceff4b62a8467a0c3aff7f3758cb11042da65e8941ffff4b429d001⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a29758,0x7fef6a29768,0x7fef6a297782⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:22⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:22⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3264 --field-trial-handle=1280,i,17929483170556980071,6943405292419267163,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2452
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:544
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2856
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1544
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1848 -
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD59232e3562ad7f38d9b3651709d8f47a1
SHA14f69da2c2ed5deedc84d399ea884758cadab6490
SHA25687594ad7340be34a93c5d8790d2424d0dc2f4294840a14d2b9102c93e7c1af82
SHA5122208f9c9a5729958213058b724cd91caa8bbd3669030f80a356806ce6eb6557faa60ecedd166d77f6fce3b4696f7c49228b83126043747da7bc6d6165c68df68
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
169KB
MD5690305bbdd82e1a80d21db07aeee58c4
SHA1af7b3c4b88e4728324a1a919b5de3ecfea39d9e8
SHA256091b36b18f91d5c70e29e8d7c1bffb788604ea58a5a2113ab7f9475fd637ac28
SHA512c79a3b3c5ae23bbd1b71e8af8b14adcab160bde0fca94812deca0349e04e85f5fe36d3f39e0490f294d2f48f73c76b64ecc1ffb901c02799c55464582b4430a1
-
Filesize
169KB
MD5aaa9bb6fa4c887cef5e28f2519f78c55
SHA1a68ab7ddbeb384a62990a64ae94abf0abe6d2a1c
SHA25693be563313cde636ef90fcd1171bbb626a8d73452edfa203c9c137554025c07d
SHA51228a91d5b46918ce4d269c0a4dc1215e57c869f826b938a5578df3f271a02413a6626cdb97694fc139dd62553568f7458fb70675a59fbbdb8ebcc47879438aa48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e