Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
Client2.exe
Resource
win10v2004-20241007-en
General
-
Target
Client2.exe
-
Size
561KB
-
MD5
aca8507a376976a952a82c43b992da6d
-
SHA1
7a42870b1f6ff373c1102603d814a1ae03832c6e
-
SHA256
e3d7a884100ddada0b7ae3b9b4865b278ce965cc9d5795518c2731778f492997
-
SHA512
f5ed7dca6e51d61c7630649a18db19179afb639da7d0c4cf66954b53641d171ecb587f9b3c61688addbe2ecbd47c06ba74a064b07f1b5785600a353eb67cdf15
-
SSDEEP
6144:eL/+3efykVMMfe5jIUJWj7vF5PfOwarYtVAM6/Ro6PYwpizdbXPitUF:eLp6kCBxIUJ0rfQMf8/G6ABB0UF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Windows\\WindowsDefender" Client2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Client2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Windows\\Windows Defender" Client2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\WindowsDefender Client2.exe File opened for modification C:\Windows\WindowsDefender Client2.exe File created C:\Windows\Windows Defender Client2.exe File opened for modification C:\Windows\Windows Defender Client2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766495345083270" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4484 taskmgr.exe 4484 taskmgr.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe 4676 Client2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4676 Client2.exe Token: SeDebugPrivilege 4788 taskmgr.exe Token: SeSystemProfilePrivilege 4788 taskmgr.exe Token: SeCreateGlobalPrivilege 4788 taskmgr.exe Token: SeDebugPrivilege 4484 taskmgr.exe Token: SeSystemProfilePrivilege 4484 taskmgr.exe Token: SeCreateGlobalPrivilege 4484 taskmgr.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe Token: SeShutdownPrivilege 3952 chrome.exe Token: SeCreatePagefilePrivilege 3952 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4788 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 4484 taskmgr.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe 3952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4676 wrote to memory of 1228 4676 Client2.exe 98 PID 4676 wrote to memory of 1228 4676 Client2.exe 98 PID 1228 wrote to memory of 2692 1228 CMD.exe 100 PID 1228 wrote to memory of 2692 1228 CMD.exe 100 PID 3952 wrote to memory of 3036 3952 chrome.exe 115 PID 3952 wrote to memory of 3036 3952 chrome.exe 115 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 1772 3952 chrome.exe 116 PID 3952 wrote to memory of 5076 3952 chrome.exe 117 PID 3952 wrote to memory of 5076 3952 chrome.exe 117 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 PID 3952 wrote to memory of 2276 3952 chrome.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client2.exe"C:\Users\Admin\AppData\Local\Temp\Client2.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System" /tr "C:\Windows\WindowsDefender" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System" /tr "C:\Windows\WindowsDefender"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2592
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2092
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4984
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4564
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4652
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3080
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1736
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2104
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4864
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3988
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3604
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1032
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3164
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4224
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1120
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2288
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4528
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1584
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3372
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5200
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5220
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5340
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5400
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5452
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5504
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5544
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5592
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5668
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5712
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5780
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5912
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5952
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6068
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4980
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5516
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5908
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6168
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6248
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6300
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6348
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6384
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6484
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6540
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6676
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6716
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6768
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6836
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6960
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7028
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7064
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7124
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6232
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6688
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7008
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:5768
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:3732
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7176
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7236
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7272
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7316
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7384
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7464
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7500
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7560
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7756
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7792
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7824
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7860
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7936
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7992
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8112
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2748
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2964
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:6428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2412
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7572
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7696
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7812
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:1008
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:7484
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8232
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8284
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8344
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8408
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8460
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8508
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8556
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8652
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8708
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8812
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8864
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8912
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:8968
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:9024
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:9072
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:9100
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4788
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4484
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffaaad4cc40,0x7ffaaad4cc4c,0x7ffaaad4cc582⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:32⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4996,i,6623637060338647783,7539488373281583480,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5aec9194345fc9a1a6d4477359d7a4078
SHA18f9536d0efbcf7a9f90f0e735f97a714bc11c453
SHA256d88863253c7e644a4c0ed5d8aaebe79a1c4c75a143a8b2e89f5c0622069678f9
SHA512c7a29a34faff23acc8c2a00005e043397ad2e3e77960dccb59ff38fdab0f4b2428baf12bc86a5e1c4283e18e6595cac557dadede2989f6a37b25a297e31f38ae
-
Filesize
1KB
MD5b3c2ca7c1c2a1dbf007b98d2dc026446
SHA16c394c177d260c3caa0ef62f71d2c32830fc70b9
SHA2565e65dcd47667f93cb23de177333bfd9743a197a7a385b250bb652bdde2576758
SHA512df80b118335b2a6cc7a4d16dfddeb913b736ab04ee0c4768daaee43c974f5fe46dba6044716e9c06fe72f17221e344f76aafd9a6efce120cd6914140cabbdde9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD55dbca949d9b0593d8a765401867fe9cc
SHA1c726fa48e5c6c6e9696742f523b33cf9c46be4e9
SHA256377af6d02a661ab5b21af4467004c56b2ddef0773bde836f3ad38cd9b58a9df1
SHA512df60bdea7b1ba386c0b7b60d000ba1db8cc2663c4632c9126d80b0cb901e867cdf6fafd9b5004fb20e72cd17014470b6981ebbc7b74e350679ad438769650bb8
-
Filesize
9KB
MD5787cb23ad3c97616f4c74e1c65a10fef
SHA16e08b7ef09a93b91cad15423c36142479bfa2528
SHA25638b7500b0861fbc3bd9ebf97c3c4e6c0218a4ea91be75eb2e22a5eb4bb09b72e
SHA512766ead6dfc21eedbd86e0d294d3f002f1f02457afaa0cda0dc38d8b814853c765dc6b7f8d3f2a4b34daab9b4bdcc4f9a084b5436bbb211b3afd9b6642012bd85
-
Filesize
15KB
MD5815a834abb02b920e707710d106365ff
SHA1b8a1f48684934d6f417046650a5d3de4574eaf8b
SHA256a85a9f19d8eeeb1122686c8e0464dd56bfb679fd04c07b1b7e46a2c964f8ef73
SHA51251bbbad68116f1138203fa493b1d01602d73cd02f2d1ca22868aa7d403c5e7ac160ba3bb63f4c84c30cc73b1952b1b3afdac45af93b512a7d0e942fef31b4012
-
Filesize
232KB
MD5c0891281286b7ff46151ef8639dbafae
SHA10339ccfa439ee5e2568c48e91701b4759b713a5c
SHA256f92d284a62954c2ca550ee2ad1760e95b5287aa0d79bce441fcb332f9ac8b188
SHA51229bbeac90a5874cee08183aedbc25639072d9ed50e90a5afb7fbe7d2b13642cd1480ab0c02d8a4f0bddec881d2680254eb65edc4200317d00036f6db87272704
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58