Analysis
-
max time kernel
68s -
max time network
63s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-01-2025 22:08
Static task
static1
Behavioral task
behavioral1
Sample
download.html
Resource
win11-20241007-en
General
-
Target
download.html
-
Size
2KB
-
MD5
8c07f2e4c587ddb33c32e034fe17149c
-
SHA1
18e31d80138535b44b5715e75e52efb08ecb136f
-
SHA256
de9aa87bc82a074d5c5df9bea385442e878b2ecdfbb0c47c864fb19756a6f4e6
-
SHA512
320bee58ed20a737c34d03aee9c875efdfa7877c26e9da0daeec092721b0bc52406c08ebe308becc3534a75da869d9b0839cf93bb1aac8f698a0851ee0e774ba
Malware Config
Extracted
xworm
5.0
87.120.116.179:1300
k2ajRGAWWdwZwgsE
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4348-85-0x0000000000FB0000-0x0000000000FC0000-memory.dmp family_xworm -
Xworm family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\NordicVPN = "C:\\Users\\Admin\\Documents\\NordVPNnetworkTAP\\Lang\\RemotePCPrinter.exe" FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 4348 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 93 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133821437540861902" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe 2860 FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe Token: SeShutdownPrivilege 3460 chrome.exe Token: SeCreatePagefilePrivilege 3460 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe 3460 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4348 csc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4596 3460 chrome.exe 77 PID 3460 wrote to memory of 4596 3460 chrome.exe 77 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3644 3460 chrome.exe 78 PID 3460 wrote to memory of 3396 3460 chrome.exe 79 PID 3460 wrote to memory of 3396 3460 chrome.exe 79 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80 PID 3460 wrote to memory of 704 3460 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\download.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeaf9fcc40,0x7ffeaf9fcc4c,0x7ffeaf9fcc582⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4532,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4612,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,14725677028379976909,13846027689550625616,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:82⤵
- NTFS ADS
PID:2124
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2756
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Temp1_FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.zip\FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.zip\FINALIZACIÓN DE GESTIÓN DE CARTERA FINANCIERA ACH.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5770115b9892554a1aa0b87533fa024f2
SHA1f4114b19a9030f6e6dc6f3b15d36271390d6ef9d
SHA256a50597eea502baa7d3fe689116559983ae3ddf1200e987df95419cd22b9c0621
SHA5121914e2f6567c3bef0da03f6d5b319fca641e58eefff88e0aa0dbd463aeab1590f49f4cbdb99d07c1ca1cb5940752a975cf91f1965fd47fd4be1e01a742ed588a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD50339f8692f1cd12b7e56d6a8e744190b
SHA12ae0f08aa2f39abef9b6d5e65dee65c4d37feef4
SHA2569029fbf275a233f1de1974c629fd9c21c415df13f21eb58b8d9498ee031b5bb9
SHA512f4c71f63f982681b2699290bef4e099c4b81d60f5b41382a54abc36c386e54775880dc10c41a6a42bfbcbf98bf6f24759f5092004950b0cd22bb8f3c3f03b7e1
-
Filesize
9KB
MD5174c5a0b8e6ce264e9241382c6d1520e
SHA18f4dc206a3dd11cc924d35ccf3ff7f078aac74fc
SHA256d33b76dd360b5303b8d87081cbdd17250d3ecdcfe08b0f1230034a87ae6ac726
SHA51269241a707f897eb6ed120181c00d48153aff3e8ad08f56475808c66405f76fd98c3d7e8f17a8b59699ed5d6eda3f8103348c10743471012e85f133fee321fc67
-
Filesize
9KB
MD54997b7ac967b678aec8de75310fe67f4
SHA12649fad131ed1ef61879d6e027d92ac8e401d186
SHA25656db9ec8a7628fde1bf7306e76174d86c14d5be57579cf685f1cd08a87732240
SHA5121b6938d2c815c5064920b5f24730aa4134d50a45be4ad27f7cb1a36d0af2e3e8d6d5bde827976dd4e41df8e8dbb76b4a41dad5070d72826576178f797aa7c8a9
-
Filesize
9KB
MD53a050e26259d3c226433eca74fb2be9b
SHA1dee60438773cd42ccc053f2dc55f41359a409e3e
SHA256ac45f8b144006220e2e7de6af770331ad524545aecd1b9b6bbbfb0380dc0750d
SHA5120def3444c0e5b03b47be22d3d073751d0cd86b3f4274f38576f41d305a8f98a015be06fc1ba205306627af5c9fc05043cede852c56de6739120fabc6d3e064be
-
Filesize
228KB
MD52436e24c37336431efe5199431d9b5b8
SHA123d146f3928f9e6d3bb4ece11cefa634d8e1af64
SHA256606c5f0d415eb5a0674d5e42b4805f1826c8bd1beb973e73d0361514af25b78a
SHA512d3c3f82d65dfefe1ae55361f3e3100e31783a5a3ed4589068f798c2a82932adcc980cd778546bf37f028378efa54bbee726b2d0d8437736f418336c828f9d45f
-
Filesize
228KB
MD5a455b27d7c9792d1a0e719bf5d6d9612
SHA1bddce305770cc2c52635b58eebaa9941d3f95ae6
SHA256333b2cb72e78341fa936f587f407bdfc16793c341b21fc0fa8bec6ddcb1dbfe7
SHA5127c31c3eb1416a80d2854ee21a7396f78f0a441d4e4482556fc19c17698d81f0b59cdf23f54249a2a24d3aea0a75b44fcb387f95bc1ff647285cda7035009103a
-
Filesize
933KB
MD50a565aabde7c9a81abe29eb6dd93765a
SHA127bf403a4dad1e384b3609692e6bbc7dafc074a4
SHA256b2966d0a78a55d219bf46400590b789cd680fd1136e19cc3474acca2d9800a9e
SHA512d486e7a33a952057d45ff0a40ed699de43a5772d1f25a194cf060552d40a7f0a1fbb7021e9c483c58196f27b9f52be16d7bf9cbc650601fd91d508b15f428627
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98