Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
descarga
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
descarga
Resource
win10v2004-20241007-en
General
-
Target
descarga
-
Size
5B
-
MD5
4842e206e4cfff2954901467ad54169e
-
SHA1
80c9820ff2efe8aa3d361df7011ae6eee35ec4f0
-
SHA256
2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e
-
SHA512
ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133773048608883975" chrome.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3428 chrome.exe 3428 chrome.exe 3428 chrome.exe 3428 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3092 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe Token: SeShutdownPrivilege 2236 chrome.exe Token: SeCreatePagefilePrivilege 2236 chrome.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe 2236 chrome.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3840 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 3092 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 3688 AcroRd32.exe 680 OpenWith.exe 680 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1720 2236 chrome.exe 98 PID 2236 wrote to memory of 1720 2236 chrome.exe 98 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 2132 2236 chrome.exe 99 PID 2236 wrote to memory of 964 2236 chrome.exe 100 PID 2236 wrote to memory of 964 2236 chrome.exe 100 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101 PID 2236 wrote to memory of 4224 2236 chrome.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\descarga1⤵PID:2768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff28b7cc40,0x7fff28b7cc4c,0x7fff28b7cc582⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:32⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3320,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3752,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4584,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4664,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4056,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4472,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5380,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3584,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3908
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3260
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3840 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\download2⤵PID:2016
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3092 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\download2⤵PID:4240
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4284 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\download"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3688 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:4812 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D44737D34D4AC8192A97AB8BDF0DC438 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6459E7825A18761D5BCA71073ACA2FA7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6459E7825A18761D5BCA71073ACA2FA7 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E2FE4224E74875965F5A72DFCB7BF841 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=044587F06DD47F0B6A21F6740812E3C6 --mojo-platform-channel-handle=1872 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E38B72365FEE0C161C70AEBCC4CF49A9 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\download2⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5b7075114a61a9a23d68567969af11e98
SHA1b552aad9f7df66aeaddaf325c256b7366a232b3a
SHA2565feec3085720c53a5a8c0101acac2be1d3bc955f26d96613f3dbf13aff6782b9
SHA512101c5a94dabaf0113b2b5f4568f8f692607458fc1eb5e6f3dc98b5310c61f787edaca3c476f0841a4d2b72c2de4f5e29cc627848a0e9fbe2a5bcaa3f88171b8d
-
Filesize
649B
MD5279f5a35487b8d6de4dd971d56fb8cb5
SHA13d3000e3c6ba5f342bc02436c7381be4a6e208b7
SHA256e452f85dca83b89c083aec4e30b184827f065a683d117b6e166a04def9867935
SHA512bf1fadb11a16988885496a287eeaa91f7dd4fa68aeba9d21f5401917afb8c4494af90fe3e6ad5f15e689e6bd1c3bea3b7ae15c12549b96a2b9b1d0f3f3ab2b36
-
Filesize
1KB
MD5c0c1a943bb0df9a39c37058f03e9fa2d
SHA1693c8bc7a53e6f161945490eca78d7cf91644efd
SHA256e565dce9a91f564fb62a25cb6a0d68ab10804dcd4d0d635546a9fac27260b105
SHA5123c6f3f8ba2b813d2901022962d738cb63c80f15f3dbe831587f6cc13616559ac11c13e10ffc7ed3d26eb22b6f7b792d8bb4c75db742bb12a447cffe460c2e2b5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD59ae362e50fd86c4d3143dc13e367a3ce
SHA1684d6627e0f5971340825c2f8e356d3ae23cc033
SHA256309bab25ab6a997a2353662cb35c40e0887b1d39bbacda3dca0d61bc00534275
SHA51223fb81670e16f380059c29b47a07243a2430513701d9ff3f18ee3d2c199858cc5e96d9987adbbd77230697e175065cfb41fc35fec74ca0a122505e06683333d9
-
Filesize
9KB
MD5ac85bbb61206a796a672d77f19d40a4f
SHA1d4b3a115147cb323439de21fd40350c6dff37ab8
SHA2569ec54119f6275a738a03110ec1b16c312783babbd21e74774321bf7b12d26d0e
SHA5120121242d3f4b3b09717432303fb759ca4cdf18810c09e1e4078343f6207e961de322a40d74d378b670d5b7b7dfec389f5f002f27a07d405caea9084a1bf70a13
-
Filesize
9KB
MD5a0ee16ff2d95de2f85ffbb8c8cc0e709
SHA16ce5474a87d2192e0191bbf86305b063f590cafa
SHA256f5f8701c3ae09a67e163a65ac5e48bd40120128dd5b4dd2ba1e93ced2e1b431f
SHA512d29b9fc4009de21b873e3864798e31c41dcba9ca7d6817d18d906dcf91fd0d5803062d46e30028f6e65450154e919591a1cc1729c6c8c0afa7c9a1840084528a
-
Filesize
9KB
MD54f180242c00e18813d2ebba86c562943
SHA18acba0ed5cb55114a4324491c773ea3ce8406dcb
SHA256e325aef9160f1877a8c3c35cefbb1da8ed49ae08cb6800be9894e9e7b6aa5d72
SHA512ebb19e672361cc835ba2af6b022bf33da670e736a51f7a9acf9297f7249eb4c37e7979142f225f0e26dffbfec793c6175edcccc5b13a584f4aa582f4f62a2b65
-
Filesize
9KB
MD5495d6271b010e09854e90ca670fc501a
SHA14bc900ec0ac5a682d69b2aec7e2ea007d4009403
SHA256b30ab5bc6ce6268c6fcea0d511a460fc6b042887176a684541f911ae196bc734
SHA5129ef1179d0a991648710be28a8056d20acd49396fa6356b9abfe47e658059bbb51d973fd5f1e844f7d2417d1b872cea632089115c8028aecee2f5a4fb6892bcd2
-
Filesize
9KB
MD5c5b5287be1d100457ef84643f95983e4
SHA10a31744d0df67c829b9790748b00a085ab775eba
SHA256c0fbe510466d1a1ad26b26a31afbc9f0bc36e3084d23e14d738f3530a291f99c
SHA5128f3ae4cebd2380901b37c0daafc343f2f0d8ba4aef272f7afa571792fa3e093b55f4cd78c17cbf27cadce9188c1df2828413fcfeaab071732266af213ef33899
-
Filesize
9KB
MD55b849c22574a1abaf096cf02e13582ff
SHA131c26617d9b6fbe3d14ddddaef807a058d373fb9
SHA25699aa9c8b8b5d234586f00af41da204385b45ca67bb85c298994e7479262c5b5b
SHA512596ad899c280eb11f4e48fb3507f68f213740d5c5fb5f3744e6a64f97d20fa7034644e65282c340cbfc803329b6e09e74940d7643ede13ae7600ef716a2961d4
-
Filesize
9KB
MD52bb6f07f662d1726a11b8d6507d9520a
SHA162ca47d51a4d97189ca5e133b080f4189f283cb7
SHA256fa24ee41e155ca4de4f1df8329efc84e9a5cede0302d65e700dafd3cd94b0440
SHA512ed3dfed6f6f270f14db0e750a5fad1a924ca99dcc73ef7c3cbc2df1022d134398ded165f15e4f5bb42ec69bedd6a515b8b45d1387bc1894edf257830fc452e8f
-
Filesize
15KB
MD53aeb9f4bf4bdfb89035146d23d71f128
SHA1d8a8f60d8f73f6f717d04cedeed448753f45f156
SHA2562dbf565a0537cf0b39454f931db9f53ed3e31239f14dcd89bb5f1dbaa1e51f48
SHA512c3953644b4b39c837811015d4a1ab1458a1a7c0ca97ddcf06e70909b31e466661f2e436ea4b23ecfd1415c8362d155a473e3d2915d573a8819d785faa5c34e3d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\eb9caa56-8caf-42bc-a535-443db13a5a82.tmp
Filesize9KB
MD5fe8743b07ee9b7f92c4fdde102bfca79
SHA109430834fa05e966ddb919da520d2df29108a595
SHA2569f7e520c06c2aa3673c166b47008ebd92c708e8e028ccf5c23d29236ba3be1a0
SHA5120a7272486dd1bc8a21d6c5b4d210119bc10880bac68d439dd866baa91173289c7bea015a05fece5198d8e84799388b3c7bb2f23c4cf031e8173148b96ad16140
-
Filesize
234KB
MD5e1679d4e030de11639106f198cd0b2a1
SHA1341539de965da97faf232a1d079e007e22cfac31
SHA25628fdf6bf5113963b868ebf7350334608509b604d0a2bfa2e05001542ef0274d5
SHA51245f207227019bdfcf3aa92019ccb0e142e2e2c7b9d199f8642c50b1ea1c987b68fb738f79930c6600b66318e45672d38f01698a0582f2fdfb7975769b7186e62
-
Filesize
234KB
MD5621221716fb0d4b8ba802d5bc0b5d632
SHA17a3dd6bef182d3d781a54911661785d472beb4cc
SHA2563dd14a2574e8d58649fa10517a324ff183c1be05a8af852147f055b9e3c18456
SHA5128b529da18222ef0ff059145261f0e6d58484b5709049c91c5edce4192c5b05de005cd5ae3722ebe6d9a19caabe75a81d0048f1f3c2736041a3604ab257f6ca37
-
Filesize
5B
MD54842e206e4cfff2954901467ad54169e
SHA180c9820ff2efe8aa3d361df7011ae6eee35ec4f0
SHA2562acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e
SHA512ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba