Analysis
-
max time kernel
275s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 12:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yxyz.zyxy.org/MARBI.mp4?u=417a8cff-ff47-4e26-b597-b2d8f786a38b
Resource
win10v2004-20241007-en
General
-
Target
https://yxyz.zyxy.org/MARBI.mp4?u=417a8cff-ff47-4e26-b597-b2d8f786a38b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133788248990573581" chrome.exe -
Modifies registry class 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe1100000056d03b709918db01f94b85aca218db01f94b85aca218db0114000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" notepad.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2124 chrome.exe 2124 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe Token: SeShutdownPrivilege 2124 chrome.exe Token: SeCreatePagefilePrivilege 2124 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe 2124 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4356 notepad.exe 4356 notepad.exe 4356 notepad.exe 4356 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4876 2124 chrome.exe 84 PID 2124 wrote to memory of 4876 2124 chrome.exe 84 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 4432 2124 chrome.exe 85 PID 2124 wrote to memory of 3624 2124 chrome.exe 86 PID 2124 wrote to memory of 3624 2124 chrome.exe 86 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87 PID 2124 wrote to memory of 3552 2124 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://yxyz.zyxy.org/MARBI.mp4?u=417a8cff-ff47-4e26-b597-b2d8f786a38b1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9b439cc40,0x7ff9b439cc4c,0x7ff9b439cc582⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4608,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4832,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3368,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5044,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3272,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3336,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5096,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5144,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4744,i,4296205995447124537,18139142253332671571,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3808
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5d7a5c3c320dbdffa72a58f6add93ab56
SHA17e80e474f50f6e4212b29c4ef3fc784c9c9dd8df
SHA256b83d4d64f5e8e644ea19d1271f462f42916abe77f8b4b947bb61795338f0ae26
SHA512ffd3e1c1830155336c033679a519eddf21b152827feed07f0fe10813f78ada532b3170c0e2753a0004ce8f2f5817597a0b556f84049fd73b5fcab2fce71cf6cc
-
Filesize
432B
MD5cd8c4015ac32895479a2d5abc1ae0d88
SHA17bce272b482f8cdb8aa826de1dfc9b8cdd7b0a40
SHA256c2dd9058e6961f98931be555a95efb59c530cbfa20b1d4ec04efc77232d3ec8e
SHA512fb11b57fac258b54b585aa11de1ef47f060e167e49008deb544d34af850a915aa279582b73b0556a27160c6dd1bed0ed407313f8af7b06bcabd3e96dc2692a66
-
Filesize
4KB
MD5c795dbde7eed0c0a09c6ade0647c26ca
SHA1e7dd439a11fac2178dac71350fbf55f9fa38433c
SHA256244f23dcfa119c400706684cc6e72d36c285473d5b5381610a5c2f74130c1de4
SHA512489cd9b219c5c148118d1e972e1e654d3d09fccda5f01a0968dbdee02b8844ca901d9c32566e9c22934dcce4d53b07d0980b9d3035e9ea99c302ae603b014bb8
-
Filesize
5KB
MD597494748bc2b0e8405fe47b90bc57d3f
SHA1df352ff402e0c91524eb26fa3704c7b4693ca422
SHA256e1437c301a12ac76336a7f8a9a7851fd8c52ee20e74a4d20e7d293bf4aded645
SHA5122112e1cfa9aab26c0c3b7f3aa36d7daec1f6aa31cf60cebf495771125101211a68fc8e2e7b0cd543ea7e7ed6dd2a9d59aaafde7e3a80540f9faa274c24a97a52
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1009B
MD5927024811baf437379d2d45ce13a7135
SHA160b106a474d7d0018c68ced16bea06d6324ba811
SHA25631459f8aad143a9340b2e50a77ca5b75d217422a6ff5ae12abd14165fc202575
SHA512adbbf82618b65872f870fb95a1334b1581c00d151bd7af88bbaa25a811b2be21daffa6f97310d87a9333c6c10407c414631374591f6238dd393aef896b00d33a
-
Filesize
9KB
MD5a071f96f49e0d42404daf14e2fc2cc28
SHA1e8f6074375deac0157cda4133d642329468783a5
SHA256d38f2e904bfef9dcbd78133874a9c8dbef6ad79fa8e900025781231e0bfabf93
SHA512113c571927d2030fb217306a07fb3e3a3380158226b371fa6e153bd3bd12f34f9ae8745a04f14a77b0f3c1d20ee6cbdd96b4e2f66d2b57717379cd45f763021a
-
Filesize
14KB
MD54c09fa9bb70f4f1e3211a843e39a25f4
SHA1b96c54e4405b483018f1a1df64d2cef8a3752724
SHA25628c288f4a2089aed24f8d3a6e0ad35122cfa9fa514803d1b8a0fd3196b3b6ce1
SHA51295fda2781fe8e5920d92a673b074e63a60c984674c2cb33de150bcf13b35c83e212467b495aec3817e91feb707e4a8af11ad7925c8ba884de39281f82a1d6522
-
Filesize
13KB
MD5be4ce1827210a669ed762dcc03bcc931
SHA175354fd9a15d6e0ffb5e2f93f614ac9ed09a7a33
SHA2569cde965000d9b810a8f040935d371459687be074a3a32f4546e7cd89c6a06dd0
SHA512fc26ddcc8800777df1a62d5efdc797c72cdb31cfdd39cb155148dbf4e33f7e55581a916194eb95d781560da6fd3650f21d9447633f344b9477c5dffad934a414
-
Filesize
9KB
MD52dfe1b21c72dae99b6d9da32631daf5f
SHA150b9c36e7aba0027df8d5406b802a328291f530a
SHA256a29cf87f463bbb8c4c5e422424bccd142a64a19ff081793b453d5f41aaac697a
SHA512f1c1ef711f3f986c73a9f835bc47a30f29ad7594885802cbc3fd50af8ee9d5eec29fccc84740d32d71af4e08f9b95f78bfa6aae244479bc71420b7d4d60fea7e
-
Filesize
14KB
MD508dff872d298ac15768bcda1a408dae6
SHA1465a52561d2486a019dc97bd68bb22b09327b509
SHA256b021cdac67b98526ed6924a20da5a391378832d8a473d63ddecd244608dda1d1
SHA512eacc66ba892bab117db177ea849c8464b9f012d9e2a921b8e95ad59f0b36b6a7b10744edaff32aeaa3d9feb4ab509926bc1e7f1fc49b5b5b745590f87fb07eee
-
Filesize
12KB
MD557c9139626109853f61d31eb1da19cb8
SHA1b61ee1ca916961c523ed223b94c338c9a2426163
SHA25655ac9dfa7e444b5aecdc5fc7aec6c1b54d8f4c962e136ef3ae713bc3af954460
SHA5120df794a20d63ce1e99285e6b4b91d1743e928171c22daca0b77c58ba7425cdd67e74c15c5e6dc8ef8c73f5faecbf066ae7f5360e42d411c7418edcf74e2f7713
-
Filesize
14KB
MD5bbcb2808f95a31b1ec205d79acda93ae
SHA1c5259bca5275d8b8b4a2888accbffa4abd768805
SHA2564cd12050578769b1386cc6ea7fa8340fc251c99fab7b0db9f6ae2f114b8fe22c
SHA512868e4cae27c14b9194a3d58f63fd5243742b7382d3db0eea0fb8b89aabc901323a03c8fb7bbc4a6101fbe613fe6eea23a0d2e44b96656f741d7d9254c3be8431
-
Filesize
13KB
MD5b3a0844224f06076dcd8cd2ebe31d748
SHA15c2ebd49d9db587d4806a5788a28723c4d63932b
SHA256eb454cdc4108905dc0a5bacbcca71bf9dc6e6a4c975ecbc996f91a623c816029
SHA51299b7f9c52cbe1c4af41aeea95dd9a581361543dacfee33d11b7c0564891d670e0b3536136baec4728298361e76b07b6ef8591c9d7700cc2f38ecfc83dd025600
-
Filesize
116KB
MD51a68c58f629a124bd157d100e5dc59af
SHA134217b356ec38d898169551df45eca1a3f1f2cfa
SHA25664bc8ea088ddfdffd5fc418c9cb29a8064a7b759745342f602df582a5fa9862c
SHA512ef60e6ebdd64c4532799e1ced02e594b0bc74386d867df2bca673fdde03281342471aad7552ae30664b9e7fe53c8be77d3d89c92f8beac9da82ce5d646068c32
-
Filesize
116KB
MD5382b16896c7a40fce2019ac4084b4db2
SHA178c5f99fefe4c739980f8904658a866123fd4d01
SHA256d9ef8d449e89d4b1f24038f7686d6059fca3cad013f19a3a2f32f793670bfea1
SHA51202867de72855c48650b6467ae8e998705c9e182224059f1ec7e60c75a99d5b77d99c18aecafa14d29b90e24587c82fec4f87bd00f711e649aea520820898ff71
-
Filesize
116KB
MD58609235a4c27f915f6422f9b10f259f3
SHA18efdcfef6be2251d526a1c0f15d5aacf9f2b6e6d
SHA256ad209324f74f987c6d05f741e5056401be34a30f5dec7e91051483a50e88f50c
SHA512ee99c7d79a5fe3d0a0cd51ad5253d6e4c606f0eb06903018f986b60a34f0767375f4201424c3f12effefd61a22ce853a1ccda6f9c21e6cfdbd0eb04ab52e304b