Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 18:35
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
quasar
1.3.0.0
ender
94.216.15.177:4782
QSR_MUTEX_QEy8FRriBXQlVUy7m7
-
encryption_key
8aKtzhUinQn7QyudpHax
-
install_name
ender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ender
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000000715-244.dat family_quasar behavioral1/memory/1944-252-0x00000000003C0000-0x000000000041E000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ender.sfx.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ender.sfx.exe -
Executes dropped EXE 5 IoCs
Processes:
ender.sfx.exeender.exeender.sfx.exeender.sfx.exeender.sfx.exepid Process 4588 ender.sfx.exe 1944 ender.exe 3728 ender.sfx.exe 1340 ender.sfx.exe 1448 ender.sfx.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 67 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ender.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771197529857792" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 4048 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
chrome.exechrome.exetaskmgr.exetaskmgr.exepid Process 3108 chrome.exe 3108 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zG.exe7zG.exepid Process 1720 7zG.exe 872 7zG.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid Process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exe7zG.exedescription pid Process Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeRestorePrivilege 1720 7zG.exe Token: 35 1720 7zG.exe Token: SeSecurityPrivilege 1720 7zG.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeSecurityPrivilege 1720 7zG.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exe7zG.exe7zG.exe7zG.exetaskmgr.exepid Process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 1720 7zG.exe 872 7zG.exe 2696 7zG.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exetaskmgr.exepid Process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 5056 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe 1720 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
ender.exeender.sfx.exeender.sfx.exepid Process 1944 ender.exe 1340 ender.sfx.exe 1448 ender.sfx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 3108 wrote to memory of 2944 3108 chrome.exe 83 PID 3108 wrote to memory of 2944 3108 chrome.exe 83 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 1068 3108 chrome.exe 84 PID 3108 wrote to memory of 4284 3108 chrome.exe 85 PID 3108 wrote to memory of 4284 3108 chrome.exe 85 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86 PID 3108 wrote to memory of 4280 3108 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/k1GzSI1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6cc9cc40,0x7ffc6cc9cc4c,0x7ffc6cc9cc582⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3760,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3308,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4932,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=984,i,712309500638412969,7406300020375121796,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1672
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2276
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\privat\" -ad -an -ai#7zMap25449:74:7zEvent283841⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1720
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\privat\" -ad -an -ai#7zMap28797:74:7zEvent7091⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:872
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\privat\" -ad -an -ai#7zMap9662:74:7zEvent72821⤵
- Suspicious use of FindShellTrayWindow
PID:2696
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Downloads\privat\ender_start.bat1⤵
- Opens file in notepad (likely ransom note)
PID:4048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\privat\ender_start.bat" "1⤵PID:3952
-
C:\Users\Admin\Downloads\privat\ender.sfx.exeender.sfx.exe -p123 -dC:\Users\Admin\AppData\Roaming2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Roaming\ender.exe"C:\Users\Admin\AppData\Roaming\ender.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "ender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ender.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5056
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\privat\ender_start.bat"1⤵PID:2424
-
C:\Users\Admin\Downloads\privat\ender.sfx.exeender.sfx.exe -p123 -dC:\Users\Admin\AppData\Roaming2⤵
- Executes dropped EXE
PID:3728
-
-
C:\Users\Admin\Downloads\privat\ender.sfx.exe"C:\Users\Admin\Downloads\privat\ender.sfx.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340
-
C:\Users\Admin\Downloads\privat\ender.sfx.exe"C:\Users\Admin\Downloads\privat\ender.sfx.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
649B
MD534d063fc8f259f642b09ee9129b4f1f8
SHA1613264d3145d30fc3d1b9551c12652a58c024463
SHA2564440f30a0eb680b2b4b66fc3caac030b47955a97e5f62234ca20185c59c39865
SHA512289ff385a4311aa7d16e91c0ea22e3feee5dd7301da47e65b905873d1a4ddde3efb47c70f811a8611cb2e15ff716ac5181f8151af1b78776592abf758b61da13
-
Filesize
336B
MD5f9174d5b5bbb9c631de87ea61df8574f
SHA1ceeba9fa1a6c6cc9a2c78b1e734ffa3aa3a94c9f
SHA2568a90655f11e9345a38389cd66d83224bd9e887a4428d68c590a14e5cd717a8b9
SHA512f7396c9429be0d37a89d3498b75f271477c832ca11199d1186683434f8375080b540453557c66b1e6ad19047e68cc1429fd9924b91ec863ca7a82cc4a4497894
-
Filesize
2KB
MD56d41643f93e5ab389f99d7c105a0388b
SHA157eae38902b2b7c7cf53d56acb10d8f7c13364f5
SHA256b7a319b03ac1360403d26732f2e1f5a2b76bbd8e76a99bf75a7c3334ed9b31bc
SHA512fd7b1349148cb497b786fbcc6a1893899510ca3d38ee6261a980e39e54102352e9981aef82c0f3ae2c3357a3a2b120420d36950e61f1258a696b03181f20d874
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD52a8d876c22160682b74f5d77ebdca4ec
SHA17084a0cf8f29162843b507f36ddccd25e7c0d726
SHA2562c4a4a77317039bef7c205d78429ff488d5f588c0f34c37e498e77f72820d7f4
SHA5120a089299fa34f9c05cc7c4dd873451ba1874f1328903d0acc55144cc16bb0c804a849515cac4bae6ad7e291b10e37066ec25716deeff729adc1f2c27212bcb9c
-
Filesize
9KB
MD50f53612fdd2b8375da1eba21a77dec72
SHA13aa770c84c52821748c55b1231bcaec3fc46a33b
SHA2569da269a88e3a4fdf25f6cd39852f9948a6b4fa0e242832981f7b3a79d14ef1dc
SHA5129df2e9d34742e88063ac31f23d13838cc8082c17a4b8fe7ea91f52328b915e6bd2423dd59586ad4fb0174a02cf8785f7e5c70539a3612afab5c790f459cfe308
-
Filesize
9KB
MD5d25cc8059f725cb8202483c81ef35f31
SHA1888056aa324e9d05f4739e11d9d453d6cee5714c
SHA2569be438adee41f8c6558270109a8d760ea503a53eac2563937aa4b5b22c7d5829
SHA512f1fcf10356b8ab13736e5b542415e6b8c4d12477338215f6de810847abc80475ad1f3a6b03ad3876e40bce3627eb984512165edf271acb30d899ad6d393f756a
-
Filesize
9KB
MD5b1c2c0385772db5aa5ad22ad7d987046
SHA1861cb34aadc4ebb51ec6c1f549edc7876816bc8c
SHA256de24040d4f6481feb099604179b32f2ee1b52e7698333fe59487e8d39b0c7579
SHA512f8b79ae8ced15af3ab047c1d130ac82eb2cd7366d274b26049602ed66fe6e6b633ab199aa21b1402eb715a6f9c6ff78cc659fdb34a03fe2744dcdb9269a84c6f
-
Filesize
9KB
MD5dfe8ba04d3b93cae54e0808159acce20
SHA1aa3ef676855f4292953a821fb3c60325ed41bfe3
SHA256c2bee36c27784cedd962cf6a0e0c47815c9b06416e7317f3d51f5777f1e9ef2a
SHA5121f15c375b19237e84845d6957c2521d71b00e358a5dfefe5b9c1f732e023975d58448843889d82cf57a6beb10f9d532d3852155a658fb10167ea362d48cd3b0c
-
Filesize
9KB
MD5c78cb035ed7a03355d4626e2ad77add5
SHA16444373dc5daa11b8fae1641bcf23af50e2d35fe
SHA256ec8a35c4dd41ef4db691e903458402001fa8c057db67244a304e410cc0496b06
SHA512e4e9e6102c139d57f7497d90e3c3dfc64be97ccb2e6ce8c0de9b35254080ef2eeacaba15c10a9a6fbf10c67fd38a441de32727cf5bc2f7f784296d1a4bae18b8
-
Filesize
9KB
MD576fd67b529af99c2dd22f6e077c07f70
SHA11b4e70a5610159268f253f4e8a8f16694b362cfa
SHA256f71986137a982b6eb6a061402bab93125cedcc4dc482df1af7676f062bd7fc67
SHA512c354b967a7ea47e67f610a53656138b36e1b715caedbadea0ea23aba629916a7f9b4dea7954e7e922604c12a179087a480b42c663241f470e2b55779f37dbe8c
-
Filesize
9KB
MD5470c8a906f631c812d42f6dbe2f39e9f
SHA19d61153ea1232acb69e30968f03f34cfec06ecf1
SHA256323c4e735ec7a0f7ff65f2fae1c53f7d965981fbbc2360566ae3f46deb6c7f7e
SHA51201d8f243d3485690d9dc4fe2416ed658f7a439a1a6fd45b335b0681e56858962a7286d7d381181aa28f0420aa2d01d5d7032477d66def594b4adb02aeae178b8
-
Filesize
9KB
MD5c77bacfeede210a5caddc8ff61d13fd0
SHA12a352e21360042dd07d00c284f8a22a7158ae4e0
SHA256b2ca241a1eac25468ba9793e79d6829691f00d8e26e72af8a82190161e482d44
SHA512fd6fc11d8976ea0e9cbe27421aaecfec2d9f05365b8b7971c643b21ffdb9f4b192d5b4ce8ba015d4c5b7c29a80f787abc97a8e762f3e0a618b674d879a5abdc0
-
Filesize
9KB
MD5d37a0e6e4db01977876d4944c914096c
SHA17b6b56fc201f92352851465dfe005378f06a074b
SHA2563a1284eabf04b2a00bbc3f83608bc51523941d990df30e21403c95c5d0f7a50c
SHA512618ea8c995034078889e2040bcafb5c47b8e9e263b59245ff3b9b9cf33265d78fe51183284e94768404951d53ec2bf370d7d277582e356c9a2dc8d586dc4fdfd
-
Filesize
9KB
MD5e92d7e3cac34deed2a0a1afa7e15ae91
SHA19f4d5c5727d0cc3c4133a5774b6e44b21f2747b3
SHA256c41962b4931ddfa3daa381a4d8fffceb0514e74821c18aee9341adb27da01db1
SHA512d599b737b2b030adccfc0c32100db405f7c666e4f5f353821eef00c870416c843694b2e56753cb3e6186ef2b6da26b41f1471c6da0d0e5ca8a4c36f4a4d7aebd
-
Filesize
9KB
MD5ac09cc04153b6112d6376f69f0845f5b
SHA12053d94b11619a8b5c9ef80033a2849b57d775d0
SHA2561b84720ba7dd7456581e02bdc933e228704adedb7bac45bfc4b729527868520a
SHA512cf03dd7766d2170ec028c2e45b1f1efa03c724742880064055b3b47d6bdb272a7a10bb9104bf690b543bdec83eda299de447fc2ff2ab314c14f6c04979b85237
-
Filesize
9KB
MD5bd79fc3cc4347673f736e2525e259ee9
SHA10cc24930c006bbd56be7e581a11f098d41e8cb8c
SHA256fa60c1062ece040eab27b0a01c82c11a5399f697336cbe5c37278a78a80cfa6e
SHA5127e1c69e013e4b249483c90be2a9ce17e269ec1e4409cc0bc34efd18976b3de694a7ff3cadea3cee39f9f6a1475845c77a579e095d963b49e89bb3f71e563a248
-
Filesize
9KB
MD50465c23ac324b98836672ee9580b3aa2
SHA1a9ebb764f3c35e1ce1d607073ba8c1d033329d61
SHA256ff35e6cfa22f3c4697c64bda9bd86915af8bbeb3f148c184f2d2682cf4fc3913
SHA512f971f11bb80bfc28aafe489e587d4cf626b51e04ddc80ea4d90b88938cd2c629783e20c2a5876dd5e5520b757d0adaec5342d2758f57c890039e02280684ef23
-
Filesize
9KB
MD5862cccf2609567461b01b5d8a695681b
SHA1f086d50c267bd1f456e9e77a111418743dd2c11a
SHA25671b460eff9eb957665af4202b91c4412b7d2c6920d8c54c61baf231280d58ba6
SHA5120da0389e80f4b533743ccb1d5f37aef08932160c186ed4272adea9b3cb7e37f9c494f39b3bf26877e8ee50da418d13e8901219f85d084d8dc1a58540777f26ed
-
Filesize
9KB
MD5ff0a9c9ac7b35354c3e2925881b69cc2
SHA1f83eda22bd4b92718c6248bbd7ba84a02a0d9813
SHA256fdd1823d4a56add4062ece786788909f0a1ebfc7a536c55ec00e57d965b1d966
SHA512d08334045a4c70b04a18f3c0c3dcfb2560b241eb584789d72bc720974c5655a9cf6f990e4f44e40a0f2511c51b3d7b1191c68c46e4871e58934f264f4811603a
-
Filesize
9KB
MD557193b11f252604a5307065b00321fa7
SHA1639e6eb9f487c946cd1334329d441cabc9abc323
SHA2569036dfb03f5a698ea1b7f190f8f7099a8fc07bfe2bde1851773b240a999b2370
SHA512e8a03a9dd70cfce8f41252f5b1da9c63d094c801dc26dfb2e2a0b505e75c454a21b56f8bda29b9066aed64c19ef8b7eeafae951f65ab38af954b229d0ba8841e
-
Filesize
9KB
MD525f447972ef1e8c3e2f5ed8b7b501341
SHA170641862303984dfc44e64b5678d939a49624598
SHA2562594082484a617b2d65fbab6405bf97c0c5522b44ed1bdbc7e5c197b50c7ee90
SHA512aeed9f547c0ae698101ddd42ccb633809a162b8a634fcf035d0069af6335b42a9a07f1ad48a16e7fa4bc55c35ddaaafabcaf21c67107e6feb1114edc74e9bd16
-
Filesize
9KB
MD57a6be9946ee3e084b932a74cc9bb7f3b
SHA15fa06ec117b18629120b9c07ba67d2742ae3683d
SHA2564a1ae7f305cac7323de72c38ff821e5c9ae50364e984710ed7c62d6634fd2073
SHA5120a967ec2693aed70ede73255cd2cd69c939d6a750bbbfb2f9e0b44fa6e25386affd67d77b09c8c063bcdc5b71e6e59f89c4b1e1590d7f92bbd20d679187475b9
-
Filesize
9KB
MD514966993eafb7e5cd6fe3b1553c9ac11
SHA1406ba0c7918a0216bd6ac567043c5e54307565f6
SHA256873a68b85743151774e9d3089ea0df265f43cdb459b8ea1df1ed8555629b740b
SHA5124eebdb189b2b779c4b49272286829d0069425a20a3153aa66bdadb85f473846192c583da8ff452c7b107f20382faf94486fdb4916d6dcd30afbfa9498c093038
-
Filesize
9KB
MD5cbc12fa7e9dfa2a34b792fad3202b0e1
SHA1938bd370a28855d75240d8c2b9c7c054c47acec2
SHA2568ced5c8c5f70d1b97e41f7b23b933f8a33cc388cea74292786c8d55f27c458fc
SHA51225d03b15f6691cd8496cabdde9995af533a3bed4a70b25f17c5a9ab78213005d16f44c3034f5fa2ac9b7f7d782dc38aab447e32be52c6063683ddf63dd14db0a
-
Filesize
116KB
MD55f504e8b83822900e3121d886150a0cf
SHA1f67d5e13cbd110c4f330217432a9cf7de0f0f84b
SHA256632ba739e978aee2b63ae8c1cea2828af5486b4c48fa34625932c4f3a42af099
SHA51283f1abb02621070f36d91048b9bcf6573b201a2ff907eec02f5f857a4749021116466d262558f38d56a063f96eed38de21513441b5bd004b94931d641e3fb4e8
-
Filesize
116KB
MD5fa48f50745f040f6b6440f0653e460e1
SHA1cb7c7d999c90d68b4b487a983211b91b2bd27763
SHA2564c77a963be1a51b86dc581aa715828b573b3ef9bc3c5f808240e61f515ec3e36
SHA512858b3c711406f4bd2395974fd12c40e6e60ce7b8209e7c76f9df57f3c1e04d5c182035eb29f9ebd1ee53fffbc8c2a28e0ca3e0cd35b775beab0b37d2d25fdb2f
-
Filesize
348KB
MD5c80b9473ee86eed3fe36f346187fa042
SHA14ffebf2695ebeaf63048024c4e3f334879303784
SHA2561290f63d1c53813bdbff41426a1633c79e0248ae5d101da37f4c1b8169277560
SHA5126fa217d6d5a7446bb0d8ac524460052229e76cec75d5054f4b87a1337baa8e3c7b8df0008716b5cdec5343e1e74843c20a3f8d0d3466c221e8faaa2040adbe04
-
Filesize
370KB
MD532592c016dec5e7a0654b64412780714
SHA10ee5cc2dd0465da1e15cc0f785406b1dfd3c2127
SHA2563e97124903da2c6f5497615549aa2b7c94a74451a5423c7027a8f8ff19fa0735
SHA5128f20310c0bdaefde70972070d95a0140297d9427e509b2fe842a2928f0462b6767a640571102fea76f87ccbd79dbab2cac6f97fe4301cdca915eadb51457c3fe
-
Filesize
615KB
MD51a1232db50a6d6259177e2d8c9548552
SHA1bf4f10e43e3b4ad97058228b5aa6b3f1e1420819
SHA2569d45423f552a9fbe121f209c97df8b01563f6c30c3fc907cd63721e6ab9eb97e
SHA5127ce0ed0bcef1740e6793096e33b007805ceca4f419dc69759ac7f4fe4f004cb37657c6110948b949aebae2f5893a11c951b7967cf61ef609c30a45b84a95ef04
-
Filesize
31B
MD58e934e1df7c7f247be9ce59ef7253599
SHA13a44a776b8b38390316fcb1d58dc3ed9bc79dc8c
SHA256afcce17a6017980bead6c844a8a6936941154a4517dce2dfa5255c56b0ee6aa3
SHA51286c0b7fb53977ba8e3a61b54330a45884d9069a32dd2c3e831600a118b9d30f2ef93ba7b0e424fab7b7e595f32b7567c34dd543fbe2577144eab0287c3379f40
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e