Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/01/2025, 20:49
Behavioral task
behavioral1
Sample
seba.exe
Resource
win11-20241007-en
General
-
Target
seba.exe
-
Size
78KB
-
MD5
9641d619bf8575e1b2d43ae2e4ca28bb
-
SHA1
e19700f8a645a513bf184146821b6b52676040f7
-
SHA256
ea0dfa0aa7c5442efd8b3cf0a553f83bbcdd5f64e9b96470f5e17d12edfdf945
-
SHA512
3d332a91a9c3f66df77101ae74465a41721f85551d6f675cdc049ed1017427887d163915655b07c555c0898d04229d82f207a69dff2f78694cfb5d73a8c0684d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+pPIC:5Zv5PDwbjNrmAE+ZIC
Malware Config
Extracted
discordrat
-
discord_token
MTMzMzE3NTA2MTQzOTQ0NzEwMQ.GF7IPf.28Nx_t4P-22zVkKEjaXGlf2UjTqkyWZJ-GTh8k
-
server_id
1333175340633423913
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 29 discord.com 30 discord.com 31 discord.com 1 discord.com 3 discord.com 5 discord.com 28 discord.com -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3904 ipconfig.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133823982165262605" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 4728 chrome.exe 4728 chrome.exe 1908 taskmgr.exe 4728 chrome.exe 4728 chrome.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1908 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4908 seba.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe 1908 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4972 4412 chrome.exe 83 PID 4412 wrote to memory of 4972 4412 chrome.exe 83 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 2708 4412 chrome.exe 84 PID 4412 wrote to memory of 4596 4412 chrome.exe 85 PID 4412 wrote to memory of 4596 4412 chrome.exe 85 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86 PID 4412 wrote to memory of 3236 4412 chrome.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\seba.exe"C:\Users\Admin\AppData\Local\Temp\seba.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ipconfig2⤵PID:1084
-
C:\Windows\system32\ipconfig.exeipconfig3⤵
- Gathers network information
PID:3904
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8075cc40,0x7ffc8075cc4c,0x7ffc8075cc582⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3540,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5052 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5068,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4980,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5312,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5372 /prefetch:22⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5332,i,6975902122242371445,10550786348181923440,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3900
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2772
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:5020
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4980
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2404
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5c6326cd7de4a0bc114d07ded93e5b62f
SHA1078a16393ecfddffcc8abc2b61ef0142180a7470
SHA256481c135a73473bf7c41bab2fbb39ca1828f84f4b3d09f2cdf0ba82aaddd84d00
SHA512a097f88ac64b939eca2bc377c25799376aab7dfabf264bd91f1264d52bc73f6cbbf2d0a3f6474f9afb706ef938bf8a5464e62c158a61cedad9b458031f900168
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD593f09725d49a05191e299c22d3751a49
SHA171c6669c67f38d57c2f365a99d5fc1f4b91d2c08
SHA256ffe3fd939c6a25d68a94eaaf379ebd210a35f902b01b0d43519dcd6dae22aaff
SHA5123e9c9bc45d4586223c62bf42cf443bafc5a75befbef18b238605b89891c06de9de87f8bac8f5c8d95384c713cc1a2cca2236419ceb306ad01fea94f3ca1896df
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD55734f794741da408f68ec60450aab13d
SHA14237fcc7e72ea9281a50cce4608bc5d78b4e9972
SHA2564e931a02406276a229ad5a5d7e1eae42e69289ff3ebcdc66e1f45c8b31a8bc69
SHA5121f885400b7ded642e0662969ade98057317c1609e38a98367e0ed803197d9fd3c95ca81804d95dfe30343019b0aa092080b38c276ab567156a43a6475ed945ca
-
Filesize
9KB
MD5cff0180e6742e670e491e4a22c53e4c7
SHA1dddcf635bdf27b1d0140349428e251f6a3f9cc3c
SHA256981571c9ceb034f03710f8ced6c0d86344c88931dcbbf808e9d1184fcda0d617
SHA512ec7a5dfd4317e3be3305159d9c90c962e9d68e184a2adf2a597096024d4346b5dd29567699506248511dc37bac7c778082d4715a6435ab4bb4a5c1407b066ec1
-
Filesize
9KB
MD5d7be296a247af09de74611d891d3edad
SHA1621489baa0b42f4aa95f113f6e0b50605d08aa0b
SHA25602399b3feacd117f947fe332fe9c9574a7de0add017ae10bc730c960158d1082
SHA5121192ddfdb5cb5e64c03f56474db278cd547489ca9fda0b3c690b8d9f3ee2369dc3e24c5acfb13cf86cdeb1fa79d5ad0a03807860c042e47e028ad61ce9e737ad
-
Filesize
9KB
MD5aaa897993683985cc683fab0de73fcb4
SHA1690b36fbad07357ae2d82a010c9eed34000d0e16
SHA256b2231279202ce4a9b836bba6f8057697db2d57e0190d4b62775054e89e9438f8
SHA5122036568fb187d26d450cc324435c79a664f3dfa4977412d87afa7f879ad55ef46c03917b6b3dfbbae6015186d79d318a826f8dd21c0d8eddf58b7d1557d105f7
-
Filesize
9KB
MD559fcb1ab328ba32aee45edb234ce2501
SHA196d671b658ddc0b5e7f53d395a72c005a2990cf7
SHA256a8aa7c403eedc605a747650a1c540e19c1ec580a280752069572169a33d7d946
SHA51289ac131dc7b1c92b304ce6172ce28cfde4c5b3e4ebe23620b9ff3bf51601b45b4bc12b0094574b4f94c4c1848169c85192180b214d78fa19941657c03565b158
-
Filesize
9KB
MD5ec57c85ba300d31827b05c788474f08d
SHA1b868a16d2af41e1e4bb735ccdf83a261265e44bc
SHA256173cf9a43660fa9fee7c100112cfab382a05e0888ff007b51639b8669882d38f
SHA5126cdbc89c50ac3441e6f49619ab81b4b5e6fcb51faa6b0342caf3a76a2d4f20218a6a065808f5cf9342a6338bf71c6bfe438e839e0de225b2f2e57dadb4586375
-
Filesize
9KB
MD541afee6500f3d6ebb6bfa92f9f83cc80
SHA15d52303f2ca5a405ff8cc20472c73930b75aa1b7
SHA256a15afac33ee5f6f0fd3e25b811c2b228ce95e08776b588f88afc0ed8ce37fc0c
SHA5128395c10238a7e7825a7f0681c54d5bed31534ea13ef66a287aab4d83db568e9f5a804da4dba41d359dee55db54e2ffe24cdb144aab1f89185e90307382829bab
-
Filesize
9KB
MD532b924762414286407ebbb1309192a7c
SHA17c3fde077fddf49a4c79895e7d47874cefd776d4
SHA256f9924a101d83f651f3d83b50d5d38ea4c817d18be11ad3488c49a28e5b9f1e4d
SHA51219fe86252b2b96c8e7f2b398ec9599c794c7ef019da57c1b62ffbee79003e9a53ac8081fd7068f642269c2fd426bdd25f605669bb5fac057add85744d81b17ac
-
Filesize
9KB
MD58586e97613b254567cd1fac776e36eee
SHA1c1c1dda715ab0b0bb68689f985eb74cde2eb3ab1
SHA256e6d9afc1aeda29c2f3617b58176a46a6f6be7c6d9c67f424ae949b96f4b944cc
SHA51260e39797cdb92dcd0891630d9b2b00895e4884cf5ccee7c00f5a562831f8599052927ff202c111b7484149bf8c57124d205f976843393366d7bebb1af423e117
-
Filesize
15KB
MD5c1f650ec0698e8a367a69f36cf1ab4ff
SHA12db09d9b97ed2cc3b0bbd89dc19e26519c30bae0
SHA2562b89b4e45054d23c3f4e1e94eae47ab62eaf7cf858035566aa6dc619110e229d
SHA512248feca1baa90bf1b1a5aa34c2d42f22f5acce9c1704392ddfe887d335be4ddf771fa67ab8ad6a64e77858fa12f0fa872363539afc8aec55aa8e5a58b9019b91
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD513ca12e34f02964ebf719cf6114d9211
SHA1cd9c30dec83697f5721d6065c4b20c6ed2fd813f
SHA25627e049ca66a659e732a8fb7fde44169ab273622d4353007816f239360621f415
SHA51261ba7f526f0cb17efbe89fa85f477210f981a486725ad683542481254f5399e4cfd4fec876db681f1263eb5e0c888d9712e8dab2762e7e604aed715586c96664
-
Filesize
233KB
MD5a6750ac84b06c3d2907aca7adf15a47a
SHA1ac8a1a0f43898a1a546a81e29ed38fbcb7e8384a
SHA2565a13629ba9e1d9b3b2e6a2d2006fa2a16577f69a36f0d4d6a38c604ffc55ba1d
SHA512a634834a18fa4f65cd83706521a1e754158f085132fa8b51b5e40428e50f3dd10ac916a1238c42b83ef5713921f002128a53037fcc222cb748fa3a72fb7693bb
-
Filesize
233KB
MD579deed885d80f5e2a2978576ebefb4dc
SHA1c7a6f4915c4bed44483ccbb94ab590cd55a7a5b9
SHA2560b6e1f269980ea899eb6477f31e06c9d3c17f373c0e685642dd077c68fd0043f
SHA512f1debb3b3b83b5d6d5c64c52b92931033137dac8db86b83e3636215b0f4d794b176027f20b73c35fba0a59340ef0790aaf9234bdf7319faeb3acf1d248106732
-
Filesize
706B
MD56b9b9a9b5773b53920edf530b29cdab9
SHA1636709881b5d0b080e3b46c7a7369e889d8a4827
SHA2560fdf368c80abead152be5f40fc74257885e65bef0a10dad76249fe30a677d2b9
SHA512aec9bd85f4c75bf0425c5074a6c95c678f30ece8b3026b183d33adca1ecfbd096652a184d9e503ab53bc6bd24ebf69e5ed5087ad990cd5e04ea4d0d9dc94d8ac
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD51e7dd00b69af4d51fb747a9f42c6cffa
SHA1496cdb3187d75b73c0cd72c69cd8d42d3b97bca2
SHA256bc7aec43a9afb0d07ef7e3b84b5d23a907b6baff367ecd4235a15432748f1771
SHA512d5227d3df5513d7d0d7fb196eef014e54094c5ed8c5d31207b319e12480433f1424d49df759a7a2aefc6a69cef6bf2a0cc45d05660e618dc2ec9a2b082b7b5f7
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727