Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30-11-2024 00:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Solara-Hash/solara-download-executor
Resource
win10ltsc2021-20241023-en
General
-
Target
https://github.com/Solara-Hash/solara-download-executor
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Oxoxox
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
3.145728e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 41 IoCs
resource yara_rule behavioral1/memory/4684-349-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-354-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-353-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-350-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-348-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-347-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-359-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-360-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-356-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-355-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-368-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-367-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-373-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-372-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-381-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-385-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-384-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-380-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-387-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-386-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-426-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-427-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-421-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-420-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-417-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-415-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-414-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-408-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-403-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-399-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-397-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-393-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-392-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-409-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-402-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-396-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-390-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-433-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-432-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-428-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza behavioral1/memory/4684-429-0x0000023FF4F60000-0x0000023FF515A000-memory.dmp family_meduza -
Meduza family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation 69d80d58-a23f-4f30-929b-bb4ed1379876.exe -
Executes dropped EXE 1 IoCs
pid Process 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 camo.githubusercontent.com 26 camo.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 111 api.ipify.org 113 api.ipify.org -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2384 PING.EXE 2408 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133774001762382706" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000_Classes\Local Settings chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2384 PING.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4684 69d80d58-a23f-4f30-929b-bb4ed1379876.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 1488 4836 chrome.exe 82 PID 4836 wrote to memory of 1488 4836 chrome.exe 82 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 2480 4836 chrome.exe 83 PID 4836 wrote to memory of 1108 4836 chrome.exe 84 PID 4836 wrote to memory of 1108 4836 chrome.exe 84 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 PID 4836 wrote to memory of 2800 4836 chrome.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 69d80d58-a23f-4f30-929b-bb4ed1379876.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Solara-Hash/solara-download-executor1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff9d27fcc40,0x7ff9d27fcc4c,0x7ff9d27fcc582⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4620,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4256 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4936,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5468,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5180,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1076,i,7779803997221659311,14966093233177360277,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2524
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\8f97e19b-e584-4a5f-8b89-7ad93ac037f3_New_Update.zip.7f3\License Terms\License_SQLNCLI_ENU.txt1⤵PID:4676
-
C:\Users\Admin\Documents\New_Update\Solara.exe"C:\Users\Admin\Documents\New_Update\Solara.exe"1⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\39da3641-7e5f-4118-9bf4-1e8944aec306\69d80d58-a23f-4f30-929b-bb4ed1379876.exe"C:\Users\Admin\AppData\Local\Temp\39da3641-7e5f-4118-9bf4-1e8944aec306\69d80d58-a23f-4f30-929b-bb4ed1379876.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\39da3641-7e5f-4118-9bf4-1e8944aec306\69d80d58-a23f-4f30-929b-bb4ed1379876.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2408 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8f8d39b6-9ebd-4bff-a145-7c8f1f3afbc3.tmp
Filesize9KB
MD53ff26f2a933e488e13bc1738c4597f73
SHA1c5b8430c69ba0f882e268fe04692345276f5333e
SHA256805fcb451aee97c79b08a976533fa49cc8120d3255071826fe075e68cc149f96
SHA5122c5c7983f42a2ba82b04025eb13f249276c6412828e5caec37fec9fd78b25e6f4eccac07879aeee72e59c62003e29d134201d305e4970aad064a36f048d7d9cf
-
Filesize
649B
MD5a11e9b45ca7df725691eb1e0f68189f4
SHA14a27113059e79098e4eafa046c24ae70bb621754
SHA256973a5043eb27f10b71f326d6ca05bfc7080b82640669beca7d18d3ce4051a790
SHA512f73cc644bf2985d7b85249dbb119c5d7a1e8237950e8793d3ba9d0bc29122b280dac178718a614ed074ea3e447e0975586dfa4d4475aa681dd3a80d8ad9fabcb
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
2KB
MD5f8bfd55f8499c7a5da0263bec6585f46
SHA1821ebe7fe46de932b699c687c4866f7e5812e97f
SHA2567bfec3332aa5b26476172c499ea7c7ebd781760a02a195f1d8522539f9ea3f3b
SHA51217175442f3f0adedaa94b0526aab9ccb145dd1412c8c64dfdf35f49e3c9b0ad2f565ad1ae64fbca72fc857980df216ea1f3ee589fc594fc868ab5e689ca14bad
-
Filesize
2KB
MD523ad8e68258d7949ae8102b605771410
SHA12305a2edfe400a75db912d942bec8bb280ee6c5b
SHA2567ab8142649ef17c1fcb7b7542fa364b6bf75df924fbbe34b8b5296d1dd50327e
SHA512ccc66ea86bb8c34f33a8f2e3d5e850c208f9d690090865cc762136556e5c2c7d4726dd0daff0cd3e4aa6705660e63cf80f8b27db21b5e7c2bbb2515ec563ed01
-
Filesize
160KB
MD50d0f7b363fd66e72e5e8bd59726d6aec
SHA104d11114dc183d8e525df10a4eac7046fe9fef4a
SHA25609615b78582a6eebf503b4a42444cd10e64f3aac67582e057b5a1684b4eb6e9d
SHA5126fd8f821c8bfaf1f6303e6f70d825ccb6a2c66cac0557e40e56be078a2553a06dc278021db2de86721f400162078f95966f18daeb8e853895e0bc2653a3511c3
-
Filesize
13KB
MD5515ce8b9251b5c3276dd2155dadf9e33
SHA16c5e56c97b52e97e2548bf2a3af5e0632e5fc11a
SHA256d2d219a6c2bb32cdf5edbbfae7cd979f642a35e64785a349e7fcd404a481b36f
SHA5120aa4e597ba66bae488d139b4ed4fb1eebc9c52ff4701d24a9723d4ce32af71aeba4ce7fa9e574b90555e63779bf1fc625bb3e3388a13ce3b1637f7c316404275
-
Filesize
329B
MD56af332c38d2bd9cb462da95a78b2e840
SHA1f4adc82a306d015907edff8b8853c7a2f265da8e
SHA25692870c6d7b3f6fd939efa69505475d4ff135b440f28e4b7749b22af116ac77ec
SHA5124ea086a4101dd5d9aa47456a87c023f8531c5dd9541e5a6a419b041be432ba465154928341e9d8161b4d67bcbe44797d50e6f0036743c51bf4340e03b6f1d990
-
Filesize
20KB
MD56748039a61ce26d63867ec5ff8a44f6e
SHA16fcec444024719ca9505b51917aadd7f0973271f
SHA25686e63ded3f2ab155b0d582b63185c68ffb66941a650ff43da605b74f168c2606
SHA512790179490d456cd6dc88888bfe4848fdae4eda2be826cbbb3947ee9411822c370958745dabc1168517e1310853b04e7b02219a9176c471fff9a6f446b999cc92
-
Filesize
3KB
MD548c61645721721d2202a5a7de4aafa1b
SHA1f8f5977327b800b4fd64143c81286e38fd46783a
SHA2567c8ace3476c0a48e2066f53a71593e0aeccd51f0d98d26369a13b62d07243cf2
SHA5129d6dded798068764857863e2017a7123417d8b7df33336db480f264a6ffebc9d89074b6a82bfff6240ad833dcf867839012e3a3a5c7c4e21b2b6dbfbf81d8864
-
Filesize
4KB
MD5caa6f97e0e29fcac54d1e7bf88414009
SHA16cc8cd146c0f46b03e4f59672c29cf97d7759d92
SHA256008df7b3e438c9d4659006c0de9c8b5fbd12dea824eba429edb57c86a9c2bf76
SHA512d184467fd593c6b30587755c7acc2043f4d637341df78bcc4e69d61313bf4554cdef729bc50ca43627ce20d03d81199733b124d9cfbed900a273afc1cc5f6b7f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51ed11a6602c211f6faa93589e4288a3b
SHA17497d5a6f34d9661c78a1312521dff86c2baeda2
SHA256a1950142e96de622c049807e88be664090d467f18324142efd9b161d795110d7
SHA5129a598bb4cc52fb911e08967d23999eba5561801a0674fe6dcbe658703f0e2dd83b8aed410a4519bd48012fd7850923093a002d2f3cd6039fe5e60a2911f3ebc7
-
Filesize
1KB
MD564962656eb748b4f36c1adfbadbf665e
SHA1f9490b9a0278498bd0fc8d3957014ca57b7c06c6
SHA2564c1eeea8e9803a6bc9d8662c817279115e3ea763db405ae25afcf156be90f95b
SHA512550f08baaf0264c898ce4135677ad0178c959d6c9669439d0eeaa32f867388d89baa57a3dc662f7c4ce6495e2c0874ff1afa3786d82c7c1cb1aab49ffa8bee79
-
Filesize
1KB
MD5d12b9202f70c4588cb9fb949892e9e4e
SHA18c4e75074d671c027083346e18c6f3ec40ab0396
SHA256314196fd9b0a266f1e20235d12880aa10e4eea5ddba7372731ca77a5bf58cfc9
SHA5121244d518f3848acc688a0371a129e8959fbab79541fc7479ca4e41627f9064140332509d7d2f8c3a38fd77f4ad7f4d64df8c8937c84c9f9e9c7f9b63a5fc387f
-
Filesize
10KB
MD57697e2cb3cbdbb2d1de43a9940b602d7
SHA1ca73aa82f2762f3fe34538484ab63ab70a6ef4f4
SHA256079bd3974471adbf9b16a7e0f2e92dc0285d74f3905e0c6e8b3a8c1af68fa375
SHA512f6023f100d97ff82fe481b6b3d0aeefb2f7d1eddd38694345b40be97c185e7910d05a7861bcde1588c563399f9fbec94351accb9fdf590f74663531970b57410
-
Filesize
10KB
MD58af7b746e34bdd55981013fb25783e75
SHA197907f381b0dbb7aa6c98678df88d0aea0b4e9f7
SHA256cd069dafb3321878cf339e88afa2fc69aad5b8f743d24416cce1a2d902b4616f
SHA512e9cb43109de5b2a14087a053bd0b4dbc36270e94cd598bcc85908921c00af4380da277102a8f1ec28ea6abf624a967dc89db35b9c7b260290f24262c5d988755
-
Filesize
10KB
MD5e4735d1db37a5969a906f2487f2f6ac0
SHA1b815baad9e0edcc07d0956c5d322169edf20ab5c
SHA25686fa90045adcc9d93a3effa1e2c80b158ffcb3b914a180e84ac59ab51f6d456d
SHA51214bb5ad811ce5bab759cab2ad4f4b3f430a4f646d04528b57c51f9fcb0f45e2da1b5adf9cbe390a0059f752999c3d0e4a5f652609d5657f3156103ee5abb5ca5
-
Filesize
10KB
MD53d62016b336ee026942458aeb182d61a
SHA17b093a61deaa04f80261d226b2b2352ec743c5fe
SHA25685c9ec33645ffdcf57fe94c329e25da5ecd0f079ea5306f9cbe628975b43864b
SHA5123005c2d99936017b292f0e30df58be695c5b15f473ca0ea7c3821d8db2b61d0ff324f5a1e380e76ba1662797d7b4bd36a35ffe588b3d167902a8a82ac0262952
-
Filesize
9KB
MD583072ad5a1a008e74fef64aa0d55c8f7
SHA1f547382a70cc4ba9900ff9d058a413493bf3b160
SHA256d1c84d2fc7a34572d6d15e9ae00563cdfe40e4931c2ad21c6536f1d56585e01b
SHA512ddfbc898fd9992502ba7e915ad1c943be163ea1fcffaa1288f0528f3477e65a83b092a088b3b699e9af78371d56e57ec1c3faf99ea6656b5b6295303fbf9c73a
-
Filesize
10KB
MD5bbb5bc9c6cdfe66b76a123b5b6a6c84e
SHA1088e26777a9d92a99cf4eb5a93e0b2ac52898b0f
SHA256e18d5fd41c62690b742926350db6eb0a67781f7b652ad2b3ca81ca0379b95bf9
SHA512170151e77dd72edc339f4b9dc7df50787b57bc85744ee7bef42e22dacbf00827e07c07d01c9dd1a461d0f2bd60640b92750056a2ed6482a7511ff1d254702f57
-
Filesize
10KB
MD50fea9a041d72eff7d2b09ebb0e40eaae
SHA13ec6af2a72851fe683d401b94c58f4bed791ba26
SHA256f2f9e3305d1e20669193575d54e0108baee9950079783c10369ccd5d76f6c11a
SHA512be47cfd0de1dbe1369cc0c2b6f4da39b86e4906d45663827d730c0a679eda44e5ee4cd90313dbfc90f161df5d3c74c48e23b986741685472aeffa95dc00487e2
-
Filesize
10KB
MD51846aedd5ffef8e6cf7fdfc0e6c19ac0
SHA177ec7a660f799cad7c78ce7c3ee24417d3400eae
SHA2568f1e0cc4ae00ba4eaeb59a0eb598342728c7161c29b540bf07f01ad6531ff3b9
SHA512b2519cfe7327f2aefa36181f41253028c708c4525bd0745dc9fd031719c7b06a47fa93859b3b5448ba29decf78c92344f5002b37ef2dcde689a4a9432f8c9331
-
Filesize
10KB
MD5ff409b6244e061b639579ae787a2619f
SHA106e2e496844a9f2b622c008df64a0018c81332c7
SHA2566963111629ce356122270ef02a4d6d64389d2e2b0da601e65e264f41fab6f14c
SHA512f1b608e209a2dfb7ad58b02a9738a59cebe9582b5e11053f50db6feda4807d48696a13c282bbcbc179b623c6c854e587c2f58dcc44eb8c1a528610af4d943096
-
Filesize
114KB
MD5b83e5a58b581dc4e8e637cbe53a1d2eb
SHA14b8ddbf231d47a5d67735c3dca6dcf8ca612ce39
SHA256c93383b83c6d7c15b9d319f1e6dd6700c6abfbc614898b9732df99cd05a263c8
SHA5126d57f1fa2a4759892a8940c2adbebe4363192c663f3cdf040068af08b4d16ef5ce66c0d14ccf9ea2f642fab6dd97ce9322c2ed5cc9bfd918597fd6e70e8c7788
-
Filesize
118KB
MD5c4f1b955ee1ca912735fc4746f961ab9
SHA1689590c67a2039275900373610760d53be06189d
SHA2561044e8151aff4fbfc67f6e39031e4925c02a0b76cd3ad555a7baec5f3b02798c
SHA512bddd52fc615333645d8d88df89f5f35f19734609c36d455cb718fa6ee07d9decf053d63d5e6354e9b47a10d8e9ffa72cd88eff9a5286e6e9dc9a896e79316994
-
Filesize
118KB
MD517dba0fc72997fdbaf2ae97bb541483f
SHA15783874ec5f3a82abb1481d1f0a7c9eb80a0329f
SHA25672fd9feeffac3adc3515c2b112179b844a03f0268f1fb7565de3c3172fabd22f
SHA512f4053d78ccf8bca04a71ed78cdef214ab47d06b0644f3dc50fbbad09cbd0f200362bfc28e03709464a16a0675e9081bb5652edb80f79026e45af21df70b37c20
-
C:\Users\Admin\AppData\Local\Temp\39da3641-7e5f-4118-9bf4-1e8944aec306\69d80d58-a23f-4f30-929b-bb4ed1379876.exe
Filesize3.2MB
MD592ce4082870f4eed463323ee77e90b2a
SHA13e33fa84df9beeb6666711c732bc9f61620ecf6a
SHA256533c3755f3d97b96b4fd933ad1db606a4ee0cd21bc39e4aff99d7e8709aa99d5
SHA512c9534df022a6cc37e695a3c0047a1d92e1bd2ce676f17abb8548f3e3ee1a4e195901fdef5124aea09a66b46fd9417138c383a23e8709de6ea09043c251a8d2ec