Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
217s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05/12/2024, 20:13
Static task
static1
General
-
Target
Panel Ejecutador MTA 3.14.zip
-
Size
1.1MB
-
MD5
d345c2eb24b0d3806865fda604ad1cc8
-
SHA1
6b813317f6108f2c242babda58097070503df242
-
SHA256
9261f3eefa0aef107e865784d8b8b62d4e7213056dfe535893920a344fa0d908
-
SHA512
76c941b833ffcef6da121c2e2735952ed81cbf7c6a6260a227040d37abf0adaa41461045c69710331345d52d95aac89ddf0a256ebc85fbdb2ed703106999ab74
-
SSDEEP
24576:ioRau4l48JTUIlfSsqFDxCs3+UgQYuX370FBZa:ioRUv5UIYsqOs3+UPY234m
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
WindowsUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x00280000000450ac-3.dat family_quasar behavioral1/memory/2720-5-0x0000000000D60000-0x00000000010B6000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2720 Panel Ejecutador MTA 3.14.exe 1308 WindowsUpdate.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4680 ipconfig.exe -
Kills process with taskkill 1 IoCs
pid Process 464 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133779032412500297" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3640 schtasks.exe 4816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1308 WindowsUpdate.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4268 7zFM.exe Token: 35 4268 7zFM.exe Token: SeSecurityPrivilege 4268 7zFM.exe Token: SeDebugPrivilege 2720 Panel Ejecutador MTA 3.14.exe Token: SeDebugPrivilege 1308 WindowsUpdate.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 4268 7zFM.exe 4268 7zFM.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3640 2720 Panel Ejecutador MTA 3.14.exe 89 PID 2720 wrote to memory of 3640 2720 Panel Ejecutador MTA 3.14.exe 89 PID 2720 wrote to memory of 1308 2720 Panel Ejecutador MTA 3.14.exe 91 PID 2720 wrote to memory of 1308 2720 Panel Ejecutador MTA 3.14.exe 91 PID 1308 wrote to memory of 4816 1308 WindowsUpdate.exe 92 PID 1308 wrote to memory of 4816 1308 WindowsUpdate.exe 92 PID 1744 wrote to memory of 1184 1744 chrome.exe 98 PID 1744 wrote to memory of 1184 1744 chrome.exe 98 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4404 1744 chrome.exe 99 PID 1744 wrote to memory of 4468 1744 chrome.exe 100 PID 1744 wrote to memory of 4468 1744 chrome.exe 100 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 PID 1744 wrote to memory of 2264 1744 chrome.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Panel Ejecutador MTA 3.14.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4268
-
C:\Users\Admin\Desktop\Panel Ejecutador MTA 3.14.exe"C:\Users\Admin\Desktop\Panel Ejecutador MTA 3.14.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4816
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /K CHCP 4373⤵PID:2436
-
C:\Windows\system32\chcp.comCHCP 4374⤵PID:3608
-
-
C:\Windows\system32\whoami.exewhoami4⤵PID:1820
-
-
C:\Windows\system32\ipconfig.exeipconfig4⤵
- Gathers network information
PID:4680
-
-
C:\Windows\system32\taskkill.exeTASKKILL /IM chrome.exe /F4⤵
- Kills process with taskkill
PID:464
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffd2f8fcc40,0x7ffd2f8fcc4c,0x7ffd2f8fcc582⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2116,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2276 /prefetch:32⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2096,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2364 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3748,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4976,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:332 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x2ac,0x2b0,0x2b4,0x288,0x2b8,0x7ff642924698,0x7ff6429246a4,0x7ff6429246b03⤵
- Drops file in Windows directory
PID:792
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5396,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4384,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4400,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5580,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5540 /prefetch:22⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5336,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1168,i,2468878654846617532,16812889702868872083,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1004
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD548c0fca8d09baff13a93a97287cf9084
SHA16183774811b0fe80cc3fdd676d7c8ff0ec6e0c19
SHA2562605fe874de65b659c00ec6160cdd22919671775e76d6ed83d10157924aab52e
SHA5123c64c2fa26686655a6cbd7a666b36c6a861db6427dc0d3bbc7b36a4b586d8680774da4ab84ddd6a0aa2ed559c4b8029ea14a027e6e24ffb96a78d1482f4775da
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
192B
MD52dc2010f049b0b059e844d8f8a40adbc
SHA1e8cf4277dc9484014264d4c7d796dbece8d7697e
SHA256c19cf0c8b17ed67e3f742fd0bfec14d810e47e21cc262fc80a5f29fc5b387385
SHA512cc27f414b56e2446c2d376d1d6430e72d4d147a3f252ca7286f021026ede2fe9b6576ac048888fc0bee06e8d679b23e0495fe589de4acb1e5ef6c50c1cfd8d34
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5108ab31220a8b9c044281509d8360c29
SHA1265a88cbfaff44657e9db2c1c2c834386f744b36
SHA25689d34fb0376b0188f52ef17beba13d4f3a372dfb13c8c1e75e944c89be1998d2
SHA51251a1d7f34f388e6601f3649dce997ad24080ccf91d3840bbc49a57ee4861f95b0d5e7bf924e9debc16dc58b16c28e5ba72a193acd59ce690c10fd395be2031d9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD584d3f24be4bf3744ff4905f9f4108a15
SHA11ab0c8ba2cb848b96508f27bbf0fba12387048d5
SHA2565d9288632f1c869b9803de7b3f76e83850dafd0fc2e540b486514647369f5784
SHA5126691ca71ae088a4b442c55d2e29fe15142de571685b6c2414d4932607bd6b716bfcbe3f2e5140b376907c3c3d67a18eecbe180e8a78a4a2388cc44d2c1d935bb
-
Filesize
354B
MD58c735660b17dc2ad9412a5930db3d3c6
SHA179ab0dbaa482d4b11367a1ddb0f2abdd0afa1234
SHA256ca13c54dec4d4d94f7c3a6dbd9c24f245309117c85bb5528fde5e639deaeb5c1
SHA512787b66de7dc17fa07bd5e576a4d48d44983c82014dbd70a3b7d6f64000bad0061e78e2d576a4997d62e1dff2ed2688e3a0a16b0403917e26d9693a47b14ad4c3
-
Filesize
9KB
MD5e74a707e1d7237e75e7a5239a511bf5a
SHA1abad934cd136f9148e2e4806e156c48c6784df8e
SHA2564a080eada415ba47ce60f7b49a8ae07157d19b278beed56cc29c16f4184fe8be
SHA5123bdc3ac53b92c6509a48642e7e1987e81a9dd76934a0e4d8f78680ad5eb5af43c56b614f47eb1ecb94faf7920ba16889bce19c78eb24f96825e57431e29951fe
-
Filesize
9KB
MD5e013c3370bff87550711608b30f31d99
SHA105eda7adce6bfcb72beaa654b560f31c2c2b9958
SHA256d5942047b5f39c5a49825271393e82c7ab7bcc8be3128b1d6f14951e3598a175
SHA5123e160048c861243c19a9155763f7ec49ad8e8c01871fe249f0223361876f4ab76deb14abab379aaf1e4333f4bc0ffeac55013a482db87d61659b659549d7c804
-
Filesize
9KB
MD5535b801cb54ec093367ccf7272904792
SHA1315f4f976db5506b561465467fe7ed6af6287fe8
SHA25609ad23ec36fcce76074d0609ab70ed6f0617f7c88cfe26122a020963fef3990e
SHA512a0c434335812833e5ac762ab51497e97313015143f9c7f1d79c5c60d05cd384b98c8370956ec2a48852be84c1247e8bafca5a4b5007c28cfd3589f999437aac0
-
Filesize
9KB
MD50490699a222f16a9d48ee038d5e24279
SHA1a56f78533898f961d85cdd7af1321136ff3ed7e4
SHA25679c0d988fd5205e1a53a0a7ff2fd394daf87afec567c2d64b1f751cbca921b4b
SHA512d6e4632ca9c5b131c2401ba151abbb7d6109dc705fcff9a7813091938550fd548fc78e961df593221155e0e14f3857a7eee3c2e2e539306290c128c6a017ab4b
-
Filesize
9KB
MD528d2355bbe166a2e51712e30bf64be74
SHA110cd14ae567fb6b943a012e7e4e00de035ce5ef9
SHA2565667d205ba362e56a7a61539dfc7afaea939e1a2e8c6f104946e3776f2c7c1d4
SHA512e682891313aa1c571db8f8028680c1e325f6fa9c30635e1838f71e19e77aa63ace836e1a2c87d67896c80b35089cd52e1deb6eeedd74068b810f427b53bd939e
-
Filesize
9KB
MD5a50a1a409eb4c33c592deb5777d2d2dd
SHA1829d228a605e5803ec46b6d68f487d763d75aaa4
SHA256fe1cb689d5d10169c6dc6010f6249a1d613bcec5e41c9d8db30da9c1d93c43d4
SHA512c425a34ba36e1d474903e34ee24c88aba1a70dc5a8cff7e3beb2b7c1b55e4774493cf1f4961eb2c85323a47307011e0e6afe490f7fa9ef9cfad9e2ce66a6a6f4
-
Filesize
9KB
MD57db323067f45563f59a088d20785562e
SHA11dc8051aaa006873c6e1ee201f28881f5302ca32
SHA256dd703609e86cd9aee91fb4d10b55e0bd166ad03a34136eb1fc04e4f298c1548b
SHA512d3b8ee24b096834d5d003d83d2b025472e82137597c1a86d4fb6adcb9d95a02faed95877f054fdc5b5be462df6c14054e9b7862988540d45a90712d1741b1c24
-
Filesize
9KB
MD5d96e2773f90ac57f6c8a09549c249ef0
SHA1247b653e7a04a3ca24661fa2b00eaf52ef508ba0
SHA2566b489d8acd74226f1992c6eb756dff1f56c5cf872243e70d9e14c30077e5c845
SHA51218ff8bd8d67e841247a56ee36c989a4e06376201b74fd22401db136de487bc6282af565456278a0aa4fcce4fc61be023550052a100d8adbdcd8001c3ac75cccc
-
Filesize
9KB
MD5be2cc8d56ee011ff63f5d3f709c9522c
SHA1ba763623f5ef36cfd0c7bd16936483aa03f7f5c1
SHA25621c456cb5004b0abb51f766d34e26ec64936bb3a1446d63f3fc7af0adbbb75da
SHA51215abb422f84ad35ad44535837c7ddf5c4e7977b96228727d694ddd932b4444a18032e40be665e789f0c5f0c10486775e1356b37c8c5c9346624d3c7597062179
-
Filesize
15KB
MD5515855a8606a122dd344d1b663092281
SHA1a974fbd11fb6fc1bfaecf03f2cf2aa6a8d39a51d
SHA2566124214b10548f2a28f35e5056357469abc93e91ffefb0827613c39c7baf09fe
SHA5121a88fcf7fe01e15969c4c4e8f81e501cda260858588b2c3d7c1bfe808ef015f19fafd124b8dbd67b1a7bedab3cf55356b35f0b2bc7b3dd23093038412e824fd1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD595409265fa3592bfda4f653120faaa67
SHA1217ec1b9bf6a6ac545e9f09bba6bf6724da34927
SHA256e93be0c88b32c4f7a914035b0d964acd40e94fb7165a4d05ce5c9af6510dcc7b
SHA512bc231f1bc49d569d17301640ad3b267d4fc4831425d36bfd11abfd7798444e4d10fc61520ae1c8a18fc01368434bdbacd7de87c5a99e5542d0e1acb827db1270
-
Filesize
236KB
MD53c3ca74ce6b084bf4dc1e57cf328cc8a
SHA1aa50e32c52904e595652ed8c8e68a7c0114787e1
SHA2569b3bbde035f773ef58b8fad7c5dd3333b808d55523d0f4ffb50132f31bbb4894
SHA5125a0b708f76c89059baa943bb9a951803a70a5e9648bed1150e20902ef6a1f9bcbdd153796f5abcb239c8724fc0be4aaf2a5a0b25cab32677cd75a7015057e3b2
-
Filesize
236KB
MD54a3722c55ec8a90e1a42b6527ac2021e
SHA11c580aa2925b24b80c532afff69446c5c4d8b808
SHA2564d23fe5f210f4922c321ee5b19f57c81e9f962fcde77344b4348e4ab21ee3907
SHA5125606d8642dc24972be21fa2bff41ca1db55cb1c04ab13c13b63eadfe22c2f41320d20bc2472e590e65ebb65cecab4db7f036be1ee13223d02c8403b5a1b313bc
-
Filesize
236KB
MD57d99fc6171e7970cf9b034584a3538f9
SHA1bea63b81d24192e0466b830b7d77b0fd7a7dc4d2
SHA2564af95133172c672d0966ebf5ceeac269fe2cadf8d8ff1e086ffeec14394ee32e
SHA51278a6cae0f49cd143cf68573a03ee1831528b280ca7efec6a7d60012b4c6dadb3df346f2ee2b3fb972076f8f6f96b044a2c0fbce1f52b0910ed250bb2388671be
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1744_1896496596\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
3.3MB
MD55791d405ca0a97a89eeaeb4f2be628be
SHA1a012d40aaaa01db12a83b0e4408d012fd383dd0b
SHA2566c67a1bf1d558b31a790e4bdcef062c9b49f00a1b3d7361dfc8308d55b87bc5d
SHA5123971447d6a5f1ffe51bb1acc0d2525aa5bca521358c67828e6bd983d68e8c22dfa83ab49109575bc113e13de861682af563a3ed21e5ef48cce1bfcdb8f1f2afd