Resubmissions
18/01/2025, 23:49
250118-3t948szkgk 10Analysis
-
max time kernel
69s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2025, 23:49
Behavioral task
behavioral1
Sample
Setup/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Setup/hidserv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Setup/hlink.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Setup/hmkd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Setup/hnetcfg.dll
Resource
win10v2004-20241007-en
General
-
Target
Setup/Setup.exe
-
Size
37KB
-
MD5
e3383ba53ecebb2ecb7063fcccff17dc
-
SHA1
cd1384e86f194f95c8939418d30c80c56c412645
-
SHA256
07eaa040d73e39f53851533c8c09d92cd3228d099236e3995b19b4c8a1c15ada
-
SHA512
563f952147c529230824ae6feaababb3ccbe7eca324d71892d2d4f68ffc0eb6eaf1edce29662c63563cd1f7c6de6e4468b35e2b96a7eb43c93aa7367c2877d34
-
SSDEEP
384:LpRWUiDZblmJEpRGyEff1PNN0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXPL:9R6HpR9Eff1P0Clm8rM+rMRa8NuxZt
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1760 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Setup.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cf848bcebf5d082d484e0ffe1e8f23e.exe WindowsServer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0cf848bcebf5d082d484e0ffe1e8f23e.exe WindowsServer.exe -
Executes dropped EXE 1 IoCs
pid Process 1484 WindowsServer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0cf848bcebf5d082d484e0ffe1e8f23e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsServer.exe\" .." WindowsServer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\0cf848bcebf5d082d484e0ffe1e8f23e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsServer.exe\" .." WindowsServer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsServer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133817178490413072" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 724 chrome.exe 724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1484 WindowsServer.exe Token: 33 1484 WindowsServer.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServer.exe Token: 33 1484 WindowsServer.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServer.exe Token: 33 1484 WindowsServer.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServer.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: 33 1484 WindowsServer.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServer.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: 33 1484 WindowsServer.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServer.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: 33 1484 WindowsServer.exe Token: SeIncBasePriorityPrivilege 1484 WindowsServer.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1484 1288 Setup.exe 87 PID 1288 wrote to memory of 1484 1288 Setup.exe 87 PID 1288 wrote to memory of 1484 1288 Setup.exe 87 PID 1484 wrote to memory of 1760 1484 WindowsServer.exe 93 PID 1484 wrote to memory of 1760 1484 WindowsServer.exe 93 PID 1484 wrote to memory of 1760 1484 WindowsServer.exe 93 PID 724 wrote to memory of 4972 724 chrome.exe 99 PID 724 wrote to memory of 4972 724 chrome.exe 99 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 4592 724 chrome.exe 100 PID 724 wrote to memory of 652 724 chrome.exe 101 PID 724 wrote to memory of 652 724 chrome.exe 101 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102 PID 724 wrote to memory of 2224 724 chrome.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\WindowsServer.exe"C:\Users\Admin\AppData\Local\Temp\WindowsServer.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\WindowsServer.exe" "WindowsServer.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xfc,0x124,0x7ffc7d84cc40,0x7ffc7d84cc4c,0x7ffc7d84cc582⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2044 /prefetch:32⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3376,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3736,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4568,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4780,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5192,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4872,i,9763636439493907614,13894979478913753178,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5284 /prefetch:22⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5201bafd6846898ece687aec3b665636d
SHA15933de453683b8c4d4b997e2c1ec87cd025e9974
SHA256de91fabeda778f101f37200f16994e7d7680e6e33255ec0b83a774301f63787d
SHA512f6c9049359272b251cfffa5cd67cafff9d16209d2adfa5cc974129ed39c6723827c9dd30bfbd46e293a7930488e2adcc947f695bd5ec2c625801bb93949599be
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD549900df43392bd66398257ab40faf141
SHA10d7712f974845abb16ceab3e1eaa40f9e66703c7
SHA25639261d8aebbc03bc3a7d35c24076dfbe2668233c7428893f583e6520c400d8a6
SHA512893aa9528a7365cd3233feef6bbd0d2ce31b67ef290368835c826e14e2dca20b6f83eca789bbb1c7dfd6e973075fd2574cad8b273d861edf6dfa99bf9790163e
-
Filesize
9KB
MD50ab49eafc522d563ba8d75a9a90a65a1
SHA1e19dfa704f5873a7c811de28ec4b6881811c3edd
SHA25676938a75fec7ee17e297572ec776ff66bf45931530ff47c75f9706718b491630
SHA5123ac93dc53565df664ae4c79cb428c6ea1ab055d58523fc9bb2cd28d1848819e504f760ad26ff5af61532974809c7ea689c66197e9bb8def87b032da1dd8b1156
-
Filesize
9KB
MD5a314b068f8b870b81d2c38da77431933
SHA11164cd8f08371f9353909888d459c99532a80d33
SHA2569c6bfb3370c7e5dc51ad7117ae0b66dd5d0c8962737eb778b6f954807ccb10f9
SHA51204013a40bddad0fe0a483d9270ca0e2c0d7db4ec643f7d70c3363e479334b530fc498863248b26b2e6b268a2bef8aa250bde4ca202c42865ad11726b213c9162
-
Filesize
15KB
MD51138e3bb54c8690b7b87caad5d1e3f78
SHA1e9ee9f47d5b7a65f8372d8acc564a0799e8d4db6
SHA25665ba0f7c64a5ace65f9e1fca31e18da7192500e4bc06d548129d1bbbac233250
SHA5124abb1db2ef6ec608e96e68fa6bb7bbee85f0b8cc3b2a21e303b9daae4e72fbe38bb8b182177c0b1c8eaef7f9b71c2ce50fb579097645f30025b1faca3ba3b9ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5abbb922076505f36608e3ae6b619b6e1
SHA116b18c4a980ca74c596f80ffa2a36f052e4ccf95
SHA256925aba1d2e0d06dae90c9a8db2e12c7a33643923aaab941a0e3cf93f48de4950
SHA512eaf6f8cca67798292316ff5b531c67620bd15b43c3e38e0066b92cf4339ee4d860cb07d1c37a9e9d5b38a1a877d8be25ef4e4b912e98821dd478088fa1b30eb7
-
Filesize
230KB
MD5d52b4b0cb2ee9c5528d711b1a9f79080
SHA1d38c3d6cd52bc699635c5e9e444825e00c93bad4
SHA256c3c0fc8742b2d7f893083768e37977dac6b776a85130bef5b423b2d696ff2a70
SHA512024fecd65a41eed665cbbb4f7d05086d69a899582d0eb0a0deec9913c1c64088fc464d88d8eef685ef9c98e613bdaa89143f4170b36a0a2fb2d06d191d2af7de
-
Filesize
37KB
MD5e3383ba53ecebb2ecb7063fcccff17dc
SHA1cd1384e86f194f95c8939418d30c80c56c412645
SHA25607eaa040d73e39f53851533c8c09d92cd3228d099236e3995b19b4c8a1c15ada
SHA512563f952147c529230824ae6feaababb3ccbe7eca324d71892d2d4f68ffc0eb6eaf1edce29662c63563cd1f7c6de6e4468b35e2b96a7eb43c93aa7367c2877d34
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727