Analysis

  • max time kernel
    100s
  • max time network
    102s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-fr
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-frlocale:fr-fros:windows10-ltsc 2021-x64systemwindows
  • submitted
    08-12-2024 12:05

General

  • Target

    setup.zip

  • Size

    1.1MB

  • MD5

    f1a1e48a1b717914efa37c23c9e26f33

  • SHA1

    821c4a93335359c3e54d84df8935b6e4aca65078

  • SHA256

    cd2a3b6dac6e3a9483df3ca219df51ca77ccfaa14213ca6ff25d072b4fee24eb

  • SHA512

    bd1c0f3a95d4a465404f863b88236866250c64689162db205b9e22f0ebb7f3352e770a32961f77a62691c0dabd030fce5614cf735c342b01db60540cc99f707e

  • SSDEEP

    12288:irJoIkjGs4Z3BvuHzuHfijjHIisCJ3HL4AV77Z2OIwfBPXquh7nwXzQzDYcKSlN1:kn3QT8qvoi53UAn0OIMxl7+uFZFQjnQ

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Async RAT payload 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\setup.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2940
  • C:\Users\Admin\Desktop\setup.exe
    "C:\Users\Admin\Desktop\setup.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Users\Admin\Desktop\setup.exe
        "C:\Users\Admin\Desktop\setup.exe"
        3⤵
        • Executes dropped EXE
        PID:2408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 154.213.186.57 4448 HVNC_MUTEX
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-sandbox --allow-no-sandbox-job --disable-accelerated-layers --disable-accelerated-plugins --disable-audio --disable-gpu --disable-d3d11 --disable-accelerated-2d-canvas --disable-deadline-scheduling --disable-ui-deadline-scheduling --aura-no-shadows --mute-audio
        3⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ffc5e8ecc40,0x7ffc5e8ecc4c,0x7ffc5e8ecc58
          4⤵
            PID:4316
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2260,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:2
            4⤵
              PID:4732
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=1856,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=2328 /prefetch:3
              4⤵
                PID:2952
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=1996,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=2348 /prefetch:8
                4⤵
                  PID:1256
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2864,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=2900 /prefetch:1
                  4⤵
                    PID:4516
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2872,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=2940 /prefetch:1
                    4⤵
                      PID:228
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --extension-process --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3400,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=3304 /prefetch:2
                      4⤵
                        PID:5080
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --extension-process --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3628,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=3936 /prefetch:2
                        4⤵
                          PID:3152
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3632,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:1
                          4⤵
                            PID:3840
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=4192,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4216 /prefetch:8
                            4⤵
                              PID:3824
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=4336,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:8
                              4⤵
                                PID:4188
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4412,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:1
                                4⤵
                                  PID:4540
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4424,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:1
                                  4⤵
                                    PID:1224
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings
                                    4⤵
                                    • Drops file in Windows directory
                                    • Suspicious use of WriteProcessMemory
                                    PID:4940
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x7ff7c5ef4698,0x7ff7c5ef46a4,0x7ff7c5ef46b0
                                      5⤵
                                      • Drops file in Windows directory
                                      PID:5336
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\initial_preferences" --create-shortcuts=1 --install-level=0
                                      5⤵
                                      • Drops file in Windows directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:5384
                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x298,0x29c,0x2a0,0x258,0x2a4,0x7ff7c5ef4698,0x7ff7c5ef46a4,0x7ff7c5ef46b0
                                        6⤵
                                        • Drops file in Windows directory
                                        PID:5408
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=4508,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4624 /prefetch:8
                                    4⤵
                                      PID:4908
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4584,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4536 /prefetch:1
                                      4⤵
                                        PID:5532
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4744,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4672 /prefetch:1
                                        4⤵
                                          PID:5540
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=4724,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4632 /prefetch:8
                                          4⤵
                                            PID:5628
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4644,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4740 /prefetch:1
                                            4⤵
                                              PID:5856
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=4688,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4456 /prefetch:8
                                              4⤵
                                                PID:5868
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4432,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4548 /prefetch:1
                                                4⤵
                                                  PID:5392
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4476,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:1
                                                  4⤵
                                                    PID:3300
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --no-appcompat-clear --field-trial-handle=4536,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4364 /prefetch:8
                                                    4⤵
                                                      PID:5312
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi" --extension-process --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=4364,i,1014647724768421663,1727511347989060356,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:2
                                                      4⤵
                                                        PID:5880
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3480
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                  • Modifies Internet Explorer settings
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1124
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:4680
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:3776

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files\Google\Chrome\Application\SetupMetrics\24d52de3-05cc-4e25-874e-1ebd1f674f00.tmp

                                                      Filesize

                                                      520B

                                                      MD5

                                                      d7bdecbddac6262e516e22a4d6f24f0b

                                                      SHA1

                                                      1a633ee43641fa78fbe959d13fa18654fd4a90be

                                                      SHA256

                                                      db3be7c6d81b2387c39b32d15c096173022cccee1015571dd3e09f2a69b508a9

                                                      SHA512

                                                      1e72db18de776fe264db3052ce9a842c9766a720a9119fc6605f795c36d4c7bf8f77680c5564f36e591368ccd354104a7412f267c4157f04c4926bce51aeeaa1

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                      Filesize

                                                      851B

                                                      MD5

                                                      07ffbe5f24ca348723ff8c6c488abfb8

                                                      SHA1

                                                      6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                      SHA256

                                                      6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                      SHA512

                                                      7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                      Filesize

                                                      854B

                                                      MD5

                                                      4ec1df2da46182103d2ffc3b92d20ca5

                                                      SHA1

                                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                      SHA256

                                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                      SHA512

                                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Local Storage\leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      46295cac801e5d4857d09837238a6394

                                                      SHA1

                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                      SHA256

                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                      SHA512

                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Local Storage\leveldb\MANIFEST-000001

                                                      Filesize

                                                      41B

                                                      MD5

                                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                                      SHA1

                                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                                      SHA256

                                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                      SHA512

                                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Preferences

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      46ebad4b428cdc09a15cccacfaea1273

                                                      SHA1

                                                      e437b722f604561d1f0c6a4c71a82f61b2095154

                                                      SHA256

                                                      fd59770d7bf386eee740732d553d09e93d2aaa22be7409678493664004d5f978

                                                      SHA512

                                                      c292d4f4c8c9875bdef0038c1e21d4e46eacdee72e0f9371fde553772a1a129342a2e93651169a30e474787c956871f7e06b7b8061c480dede28c55d0c8c4bd8

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Default\Preferences~RFe58f095.TMP

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      cf173784a90d6d33df91f87a9de95d87

                                                      SHA1

                                                      65254db1431a5a95a868543c78dc35312749e5d9

                                                      SHA256

                                                      24ea743f3ace1f0dbb14bfb9eaeebc0f7ee8b02758f8b776f12727535fe6e8e6

                                                      SHA512

                                                      4cc5839d9deb63ecabb3fe5cc1d5b37bb5733c52fa93adfac9dd7cbae43c4c6b75b91cd15f1d2f1d8f430e5776b6b6eac88adaf0241692347f79ee141d3d8579

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\GraphiteDawnCache\data_0

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      cf89d16bb9107c631daabf0c0ee58efb

                                                      SHA1

                                                      3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                      SHA256

                                                      d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                      SHA512

                                                      8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\GraphiteDawnCache\data_2

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      0962291d6d367570bee5454721c17e11

                                                      SHA1

                                                      59d10a893ef321a706a9255176761366115bedcb

                                                      SHA256

                                                      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                      SHA512

                                                      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\GraphiteDawnCache\data_3

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      41876349cb12d6db992f1309f22df3f0

                                                      SHA1

                                                      5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                      SHA256

                                                      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                      SHA512

                                                      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Local State

                                                      Filesize

                                                      118KB

                                                      MD5

                                                      71122fca18d470bd1564b3e5b0cdf223

                                                      SHA1

                                                      5c30e62e9bd49f31edf87d73d76ee4ef60c94f39

                                                      SHA256

                                                      8fa68fad6cf76d9a75ef521578a38d3c9b3fe7ed799f2cc3e830e60b80860b39

                                                      SHA512

                                                      a45064ff71b5bc4c856d19cca7e12b702e340bc13a5bb0e434422a3605a1da8f56e319e713060954694a9bdd286111d558990d8d6bca4671ca09446779683761

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\Waluigi\Local State~RFe58f076.TMP

                                                      Filesize

                                                      932B

                                                      MD5

                                                      0f241c00ccf13e648a9f6def03debb52

                                                      SHA1

                                                      30e966ac0d0724971520a7c824dadf8e8471cf04

                                                      SHA256

                                                      6109fdb2d2dea4d7377a889adb7364d92b6790afc4f9482cfcad27138e557d15

                                                      SHA512

                                                      f80576e98ac40a870958bbb8e8e7ac19ecc9e698435cdbff6eb0fe6cc28ed01d94a7ee15480e1017c28847e8bedf27b33933c7de422ef5f141ee78ec00c6632d

                                                    • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      0e2028553ccd8249e164a762e820375d

                                                      SHA1

                                                      3cd6a56d1ef105ee3e1c335ff6c081c51cbf0998

                                                      SHA256

                                                      2f8dd25451d9908149fd8c763aa7b7eaa6e28f56d99010743efd0f5336fe2196

                                                      SHA512

                                                      f61ed24be244b8e0012af740a2b0f1e1096a374e41b7b98698b85ab5d94b200636655758c7d532a7e321db6a934e3bfe209e2c6e71bf00af30c7994ddbefaa76

                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir1324_1630283252\CRX_INSTALL\_locales\en_CA\messages.json

                                                      Filesize

                                                      711B

                                                      MD5

                                                      558659936250e03cc14b60ebf648aa09

                                                      SHA1

                                                      32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                      SHA256

                                                      2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                      SHA512

                                                      1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                    • C:\Users\Admin\Desktop\setup.exe

                                                      Filesize

                                                      3.0MB

                                                      MD5

                                                      0fec7c25ae41bd0cdb48e500024a70f8

                                                      SHA1

                                                      edb70811ea4e77db3cf1be4e8292b1aec4868a79

                                                      SHA256

                                                      a072692240a98e08b304e863f5f6550a3730da6cb0df8fca4fbacf92f43d4bd2

                                                      SHA512

                                                      3a21b97c257ae5ae7d804f593ac98cc479621c21ecabb54b3af7d9605fd3a60f6cad78d0a78369708e3fd55965a0d833210ce6eb7163f14776ae2c96e8f5d9e6

                                                    • C:\Windows\SystemTemp\Crashpad\settings.dat

                                                      Filesize

                                                      40B

                                                      MD5

                                                      e3428c3b112861192ad23d27e14c7038

                                                      SHA1

                                                      2127a72aa21408fa0325b4a3280ff3e1a17a4e55

                                                      SHA256

                                                      984ce14e18fd67568bcd606806a5b4ad4c2b4cc274c528b2fa378f5d5487a00a

                                                      SHA512

                                                      0f8c4cff3ea6b5bc825b210a2f4c9e04305047c96f0cc62aff959f834d4db6d823aaea250940539065cdb79cd078aa36b3867e4ebde7a5805425957460cfb7ee

                                                    • memory/1124-32-0x0000021CD0500000-0x0000021CD0600000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/1124-52-0x0000021CD1E30000-0x0000021CD1E50000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/1124-138-0x0000021CE3D00000-0x0000021CE3E00000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/1124-79-0x0000021CE5060000-0x0000021CE5160000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/1124-64-0x0000021CD1E70000-0x0000021CD1E90000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/1124-65-0x0000021CD1E50000-0x0000021CD1E70000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/1124-34-0x0000021CD0500000-0x0000021CD0600000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/1332-31-0x00000000033F0000-0x00000000033F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2756-21-0x0000000000400000-0x0000000000410000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2756-24-0x0000000006050000-0x00000000065F6000-memory.dmp

                                                      Filesize

                                                      5.6MB

                                                    • memory/2756-29-0x0000000006D50000-0x0000000006D62000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/2756-28-0x0000000007A80000-0x0000000007B82000-memory.dmp

                                                      Filesize

                                                      1.0MB

                                                    • memory/2756-23-0x00000000058B0000-0x000000000594C000-memory.dmp

                                                      Filesize

                                                      624KB

                                                    • memory/2756-150-0x0000000007760000-0x000000000776A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/2756-22-0x0000000005810000-0x00000000058A2000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/2860-17-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-14-0x00007FFC4C8D3000-0x00007FFC4C8D5000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/2860-19-0x000000001BF30000-0x000000001BF4E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/2860-18-0x000000001E0A0000-0x000000001E116000-memory.dmp

                                                      Filesize

                                                      472KB

                                                    • memory/2860-25-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-16-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-15-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-20-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-13-0x00000000034A0000-0x00000000034C2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/2860-12-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-11-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-8-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-7-0x000000001CB20000-0x000000001CC22000-memory.dmp

                                                      Filesize

                                                      1.0MB

                                                    • memory/2860-6-0x00007FFC4C8D0000-0x00007FFC4D392000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2860-5-0x0000000000FA0000-0x00000000012A4000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/2860-4-0x00007FFC4C8D3000-0x00007FFC4C8D5000-memory.dmp

                                                      Filesize

                                                      8KB