Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 22:32
Behavioral task
behavioral1
Sample
ArgonSourceInstaller.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ArgonSourceInstaller.exe
Resource
win10v2004-20241007-en
General
-
Target
ArgonSourceInstaller.exe
-
Size
469KB
-
MD5
e468b718e67495ea73c85d8258059adf
-
SHA1
dcad70f5c39ab85f900ef1288067dbf51eaeb503
-
SHA256
fa9f629254a8bbe915bbd587c0c060de580a18992103858a1d16686de8bd717e
-
SHA512
b4eb6cc848b5ebfc6bab7e1cc033ec468bc8cf2fed72ea912f9fc60d6eaab75664f4627646960dccab2aceefeab9c5acbd2fe1b57d992c62358929b4d840dedb
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSJn9:uiLJbpI7I2WhQqZ7J9
Malware Config
Extracted
remcos
WaveSourceLeaked
204.10.194.175:4444
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-46FS9Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ArgonSourceInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 4 IoCs
pid Process 4024 remcos.exe 872 ArgonSourceInstaller.exe 3864 ArgonSourceInstaller.exe 3764 ArgonSourceInstaller.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" ArgonSourceInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" ArgonSourceInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4024 set thread context of 320 4024 remcos.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArgonSourceInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArgonSourceInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArgonSourceInstaller.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133792941946487771" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings ArgonSourceInstaller.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4024 remcos.exe 4024 remcos.exe 2940 chrome.exe 2940 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4024 remcos.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 3584 224 ArgonSourceInstaller.exe 83 PID 224 wrote to memory of 3584 224 ArgonSourceInstaller.exe 83 PID 224 wrote to memory of 3584 224 ArgonSourceInstaller.exe 83 PID 3584 wrote to memory of 3536 3584 WScript.exe 84 PID 3584 wrote to memory of 3536 3584 WScript.exe 84 PID 3584 wrote to memory of 3536 3584 WScript.exe 84 PID 3536 wrote to memory of 4024 3536 cmd.exe 86 PID 3536 wrote to memory of 4024 3536 cmd.exe 86 PID 3536 wrote to memory of 4024 3536 cmd.exe 86 PID 4024 wrote to memory of 320 4024 remcos.exe 87 PID 4024 wrote to memory of 320 4024 remcos.exe 87 PID 4024 wrote to memory of 320 4024 remcos.exe 87 PID 4024 wrote to memory of 320 4024 remcos.exe 87 PID 2940 wrote to memory of 1824 2940 chrome.exe 92 PID 2940 wrote to memory of 1824 2940 chrome.exe 92 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 2608 2940 chrome.exe 93 PID 2940 wrote to memory of 4480 2940 chrome.exe 94 PID 2940 wrote to memory of 4480 2940 chrome.exe 94 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95 PID 2940 wrote to memory of 1984 2940 chrome.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArgonSourceInstaller.exe"C:\Users\Admin\AppData\Local\Temp\ArgonSourceInstaller.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- System Location Discovery: System Language Discovery
PID:320
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff909f5cc40,0x7ff909f5cc4c,0x7ff909f5cc582⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2348 /prefetch:32⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2372 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3296,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3708,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4824,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4984,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5176,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5116,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5180,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5324,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5156 /prefetch:22⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5228,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4568,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3484,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3144,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4872,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4656,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3340,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5784,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5908 /prefetch:82⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6060,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4728,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:400
-
-
C:\Users\Admin\Downloads\ArgonSourceInstaller.exe"C:\Users\Admin\Downloads\ArgonSourceInstaller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5012,i,15901708547994067598,349236424273707438,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5028
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1368
-
C:\Users\Admin\Downloads\ArgonSourceInstaller.exe"C:\Users\Admin\Downloads\ArgonSourceInstaller.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3864
-
C:\Users\Admin\Downloads\ArgonSourceInstaller.exe"C:\Users\Admin\Downloads\ArgonSourceInstaller.exe"1⤵
- Executes dropped EXE
PID:3764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD5e468b718e67495ea73c85d8258059adf
SHA1dcad70f5c39ab85f900ef1288067dbf51eaeb503
SHA256fa9f629254a8bbe915bbd587c0c060de580a18992103858a1d16686de8bd717e
SHA512b4eb6cc848b5ebfc6bab7e1cc033ec468bc8cf2fed72ea912f9fc60d6eaab75664f4627646960dccab2aceefeab9c5acbd2fe1b57d992c62358929b4d840dedb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8e05b80d-96b2-4f3e-b534-1ed64e51bae7.tmp
Filesize9KB
MD59da54758a01f7bf369b6366d0f5b3dc4
SHA13e1c703d2ea26ac237184bff74cdc03d5507aac3
SHA256341355a9af2741c4bc8124d46e046f09c4bbda111139d347fdb5583b379302a3
SHA512f632702360c811a2a63ba46b336bc2d16827bcdec65d0f6d120ba26f7b5a7b1e56a7a1b0d7ac40b7d0ee8efd1ee4a307102671aa7e317bc5d027ebd0262cace9
-
Filesize
649B
MD5ea3b0d03668edfd2c2dbd70f8cee8ee4
SHA11c879977f604b7135a7e0a46dd739f241e3c8ccd
SHA25612810e5e7058b93c6e1aaf22474f789dc0e4a599a93734ef43a304666c8c28e6
SHA5125a282a460c46539bbfc5eabfbb0e139d2da155b1dfc9be6b961b934f3d57269c0a8fd022be5e770d1a88d75aa8632cd83bc97e4a8da4039c350341e856ccf65d
-
Filesize
192B
MD5a6839dd21c1ac5e3f4d981c2fbae30c0
SHA1e3bc75b322f70c08d2e0c3ecce8268dc90e482a6
SHA256a7f19241c2ac751df6b9aa72c43d54c69524bb7c51d8ea397452abc8d7bbeec7
SHA51242646acf911079b6a88bde1bd7a0e95c4d0e979481ea205ba895eddfcd891d2347091d371fdc30c15851036d458bf7c31dcf2688cc49795a2ebb275120eb0a80
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
3KB
MD5caccf127afd890672daaffacaea278b7
SHA1f5e45ab084b6cb1d07072e937a7c63d82984754b
SHA25681aba7eba32d8a00d9956eb2cc838278b3412ccdc51b594b016f46aabd4c870f
SHA5120a529435f90d86847d482c86cca1010eb279808052408c9e128122c1a301fe08563e9cec5ba9cc31a5048b5691ad041f1ef6387d584cf0de76d6bba271fd4f6c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD56dc9ca64fc828edf841ae471605f9d21
SHA18f53ef6105dd8f201e16999b702a8800e3615017
SHA25636cc49b6f1ddf98bbf106513750c4363066c07a5fa0c8c24aca24f0d4f03b297
SHA512e50d51c04a826ddcf7946905757478a9000496221e9cff2e3dd0a9d78edd1bb9d9c90c0e0e878d2d9243a9f3dd89edd7b109354f1e636fb193c569fafd30fb41
-
Filesize
356B
MD5ebcece96f7d44bd904576d339ac76d7f
SHA1fa5f99cc4053b132041e597962c2d50506c51ffe
SHA2560489866b069dc4966db620d0033f1d3eef29e80d7056f7a93e1be1d8e9239ad2
SHA512e70d6fdc7d0f132cdda21efc1a26fa5368751a6d34b633f3fc3398788127fbbd46feaf66fa692171fb23579f8f0949d33089fd527e1685797dc740c8df9265b1
-
Filesize
9KB
MD53003ef71a791264cdcdf9ed0b834c71f
SHA1b0161833a67ab40a19afa8fb5b95fdefea94127e
SHA256ce512559b93833ce13dfa4db7d0e204b0c769a1afaf751a4e2be06efb9a03673
SHA5125aff4f62297be284944415d646ff0de0a7ae42fb1af24b796a413d0f5abbd3c1fbee015dd102b603af4c5e626ef5629648800fbbac28a6508b50a30502624d1d
-
Filesize
9KB
MD5f8e94b7fedf0b029a2021f48060c90ce
SHA1748ac9b5d332d9f219e32113b3bca4c3902337ca
SHA2565b4539e7ebe0928a298eab003690abef6ec0f74f040ef1c753b0488001082741
SHA512cd23054b75aa0158b749062c08f6a94a230582348a144dc9eb811ab6482bcf1e9c8d9845677029425f40f23cb5f007816a4f0dd41d62402244924d438b3f7449
-
Filesize
9KB
MD53237c4fb67ce90549198c7d8d2b84829
SHA1df356304cdf2e5b1c4bf0799653392ce8258fd23
SHA2561b647372cdb66d261b2996656081f231274aa26e30b1f91ce166c3709afe23a4
SHA512b7ec61710de9c9b17a3f87c0818ffa6b1847116f6df9a34c87bd93ecc944e20dea785782c49651d82ba6414acabd4cd5a1dcab2d5fdda6bef5942af1a2d634dc
-
Filesize
9KB
MD5bf040d28b82d75b7d8eaf949d5877407
SHA12acf54f57014e1940fecf853d6d581d311512d9f
SHA256e022e27cbba0d8386191ccad1e6bde6ff56123f5fea9309358c7a28cef854287
SHA5127f362351ff599edf4494b22e369288f6b1cc8848ec6b044928d48b6e17606267dd340125aa3072045f502eb46ca8d38023e7431ed73fd984ac1b3d6aeeb54cb1
-
Filesize
9KB
MD5192342f06c3e288226b2bc7bccabaf11
SHA1be7c620c2abe6fce18e21edb5a1bab875a347f6c
SHA256c4f7d9effc470be3085f716518762c4e0135ea80a81d4b010380bddae00bc161
SHA512b4501284035dc257e484710b15ab53e6100c71db6026f37168ca499823b621d2d89d9f74cca372ac859eee339b7c06bad6ff14ad3df44494ebe1f40b8f91c959
-
Filesize
9KB
MD5cdd3d7fd89f163c76a1d5d45d6f88e23
SHA13c575a545c7e0dfe1bc0a9c05e46bf225c9c1099
SHA256e5b93e4e2738d8e2937d08dae9cd9ca9392bd81c5ca27a3b14a62183066fb6c1
SHA5127fc9e1f8556c96489e6f22c1f684b69bc429beeeb24d3d7d810f40e02656378d108ba1d032ab29aeb7443822f886f9121cfccb1381969d887f14c184f136b5d0
-
Filesize
9KB
MD5807d2997ea6f2687e36526a8be7af4a0
SHA15dd6bd378575c56bba28603942948643978014d7
SHA2568e9780d42b97cb3893958026c78a9c1c8dd310c1e0319e4a116010b2bfc5deed
SHA5128583b731fed24bd2091b9a03530dfd51f30e155f78791d108a7bdbf111592146bf98c83f9b5757caf8a8fbcc7e2647026c292053799f6939272ba76df0ec99b1
-
Filesize
15KB
MD5dcc102a2a36c0c7c1904d59bbd1aa29b
SHA1e673498542cedf622de0f132ef83bf414d9ed7b0
SHA256b984772b5db275edfc710ea82d7e871a96f7fe2d86a999a2db312dc2fa28152d
SHA512e97dce02d91a9b388b4b0b1b493fff028329f7c234454eda91e51834b617c3e81cc4eef9ae4cbc4ce1470fb6b328619f8319b4538522abf3db68842f512d7ced
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5e85618aca3ab087daa12717498d3469c
SHA13bd96349ffe70833fd6a269d42a86ec10bde212b
SHA256c0fdcc07583fb8e9cbe4f1f85762ea465a91bdacc4f9d9ca12f8dc26096535b5
SHA512766053913f361b7ca38bb332933b71a3c57f37957a1d77b53cb8485f3bb7265b84eaa7b782eab2a30272ef25dd66550801fefb51ee12503f9e180847cd8440e4
-
Filesize
231KB
MD5488bacef32b0578a517da436894a4ae1
SHA16ab7ace977aacd9ade3c55bd1428b53de9582ae1
SHA256747b068d075a85ce94233173ebe2d8757893a734b13c92f7f918077fd20a6a8a
SHA5126541dc78ef34896344fc62add6f316017a8aef49f959687b7630fa2a0efce795733e7b1757990cfb2fd4443e4631d4bf98b45b65f4c22bd54f086df3a5bc25fc
-
Filesize
231KB
MD5debb6b1b7d6e1cb0c5c0639ae58ea32d
SHA1563fe9c9c00fedcfc90cc9e7d391a312981cad79
SHA25659b7803acd4d3c531e0449f1767b5dde4a17bc29adb7a36e45f3bb3466b99e65
SHA512c1705e0b7a91c7179697799305be6bdb45e3f1fec19a9fd0499d5d2a3778f7b2d80281303c3c36bec3680e8a5ba56ba0700103085f362c93d573787dec1ebc6f
-
Filesize
386B
MD51ec6289c6fd4c2ded6b2836ed28cbeb5
SHA1c4e08195e6c640eb8860acc03fda1d649b4fe070
SHA2566efdc40f9eb217f879607614e928b65bff759e424f3efb31faceb2a043c32dc2
SHA51220bc46f4dee22f75f15c402c7c2eaee60fff7dd92548050585571dcbefd59485cc249c06bc3f1aac7a138e5ae67c0c3918b46ffa24c8b0f1b092e2f6b6e21288
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2940_1364487677\57004a0b-dacd-487e-86ae-60554c7340bb.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727