Analysis
-
max time kernel
62s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 17:08
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
61cc66d0b245e378647cfe3a56a51814
-
SHA1
b097cfda475efe6f4819b6c2db99caf744632f2f
-
SHA256
7c52f297d8d829076e1607c1b7a7a5e584adef82a01e2520dabe6ca801fb55ed
-
SHA512
422a99ce926f2793bff05837e9a226c937a89f59b221b0f9b346a1e7d32f423d2a3b6d8efe87111164884ef3983b6e50aace751531998c4574ea5b2e96da4b74
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC
Malware Config
Extracted
discordrat
-
discord_token
MTMwODUzODYxNDg0MTM0NDAyMQ.GZlTOB.ShLTCmYqgKpUZGmBxJbpfXARUmaxc_aOPfIYyU
-
server_id
1336013454258995351
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DDE17533-69B8-11EF-8202-7A9F8CACAEA3}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9E4E751-E251-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 2460 iexplore.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 764 IEXPLORE.EXE 764 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2148 2516 Client-built.exe 31 PID 2516 wrote to memory of 2148 2516 Client-built.exe 31 PID 2516 wrote to memory of 2148 2516 Client-built.exe 31 PID 1988 wrote to memory of 2736 1988 chrome.exe 33 PID 1988 wrote to memory of 2736 1988 chrome.exe 33 PID 1988 wrote to memory of 2736 1988 chrome.exe 33 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2720 1988 chrome.exe 35 PID 1988 wrote to memory of 2616 1988 chrome.exe 36 PID 1988 wrote to memory of 2616 1988 chrome.exe 36 PID 1988 wrote to memory of 2616 1988 chrome.exe 36 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37 PID 1988 wrote to memory of 2636 1988 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2516 -s 6002⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7b59758,0x7fef7b59768,0x7fef7b597782⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:22⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1552 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:22⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3172 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:12⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=1372,i,16357255798878641350,8291277477823958378,131072 /prefetch:82⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:868
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f7f7688,0x13f7f7698,0x13f7f76a83⤵PID:356
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:316
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f7f7688,0x13f7f7698,0x13f7f76a83⤵PID:2300
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1008
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:764
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275463 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57236bda09b69b8f8ad39e513cf941203
SHA1929206ba1821c8bf69fbf06bd8fdcc651643d32f
SHA2569a84458e68cf27d22c69933a4adf66eadca282c4af9077eefefce6523a0a9f8d
SHA5120a9e6ffbd82b43ecfed2750abf70989cb0fdc6e6e523f5f84680060ed5385335041067e7ad5d88728718e27ace9075e6bf0db69adf816dce5f62fde936207ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c68336c1af332450add5bb3520bda53
SHA1ec06410e891d636fecd3a2555c3a51650ba43e1b
SHA2566945f88cdd7f70779507bf0c5695bcd7930a5bb4eb0310dda750d72284c439e8
SHA512e8f4c76e02bd8eedf7379c023cff6202edce636e9393dbc0b5c69e5e52ce9250917f42c954408c6ee59a51d9f5d905e3e5dffd3d0f311241411a682eeec62f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03b3b6af6895ffdf0e4f1c965a08df0
SHA1dcee9eac02ceb937c1f7efd7aab267f3236fecaf
SHA2561eadb2e183b1af9b7682336f9353eb28b7b48d674f580cbffdd85dd72afac52f
SHA5127a7b63c1c372681a88b96d33eb0fe043751772d7727cd590934d906d8f1c53b694c2d8b029144e534091efdee621225b17381ae75224396a3e120024f3e73852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c7807a21310da28d1137cc995365107
SHA187425681aea17b91d5988f6f2090377667ebb415
SHA256e96e79bfd177e961b5a905f40f99842f13b7ca17dd56894c1310f4d6d43902df
SHA5121bca9b4df276ce813fcf595414e6c3dcffa35f769de54eddc929c2d654157f07c9d8b496f67375f84a06bf25730b9ad8b822f6970d3d3a0084c409076b2be159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba4f8ef369d0ad9ff649db709b056d3
SHA1355112180482faa4a8b64350724f449f3918b453
SHA2566dafe5430c1d05aefcf37b2b63453eb3bc5caee5f087541559a55f6e1b3d462e
SHA512192117b0bab81be14cf6e32aa4692e0bdd84b5e9188faf59f8947b519ad29f0ad6d702192eaf4a431299133c5888b25110cc1a64bc199ed0c1418289d48825f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b008e601dda615f6c151129eb953714b
SHA1a9e048935558162c2a2a0685d3797cb8c64170fc
SHA2560f0b29442e972de7591179a4f302a469377fd2f2dc383b23a47328b0610d060a
SHA512bc79de661aae0d9bfbbdf889ede29e3b522e5f50be8b2ef9bf4cdd547d5c8248cf34a7f8d778cac238e5ba0bd8b6f8f75f1a05ef0487f436aa732ce0781e0427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adea190ccd81ae9dd5ab97805c5941f5
SHA12655eb2286c2d411bd7be273adc52cf327ef1a13
SHA256c3fc43188ab0eca6e31a721c1e2863ff19ed493fb7b5d62e8975829b8e3e8438
SHA51223e321b02461554e91f972eaecf1b276525784d8c9d5861c8599cb2562f0782f5fdf74d242eaa8aa251340a82e979d22cb466f5ffab31eb322d712db9f1ce3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879c9667c32f6f956891e632187cfe66
SHA1c966540818af72b712a49aad14eddc83439ac08a
SHA256a8ca31cdf4c208d3e6539df57ff05a877dc2c54d0f2bdd493d78b8b55cd44503
SHA5124ed612a858c87cc50641f616fdbbd5adad96c7dab90106de0df09cb061099ee03be38b24e679a30564b0d34a4c12b338ce2cf5ce5427d9ed13b13448e0ab2faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6020411d2933af6396e81c058d4ac3
SHA18fcbef25422f538178a8f375c2c529c3ca4cdcab
SHA2561141fc2b19e26a0af0fecbd7ecc79db8700279dcc712a263fbc48ec830d38f43
SHA51272194e34420a2cd97364ac4ad59f459476ac9fbe0e415bece79a7d7a553ddab1dc87eaa0223149d179bcb5e323d0de547017e0b2795c43d0fb2bb884f4cb90ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565af67596a1a93c174d9ffedd9e2a3de
SHA1b1cb32d346512460f2bd2968d273bcc2546f41ec
SHA256e842d3a1943f9a1cea85cca745f1dac0f2413aa6418035cb1296b0562fc5d122
SHA512e68175aac287ac0abeb9b6691d38731a35e24c2c7c464b9b0319cd2a648b0e2e3f38646e7825a2dce59289775d22acb99e446442345ab7248bef91b0a787d12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4e9ab0d35364bb644d9e390fdfcf13
SHA120a8a298148981722f71e0607bd9f162d79abbbe
SHA25660200cf4eea5ae7c8fdb8e91955c50eeff6db7292a0b18fadc042105670e40a4
SHA5120be02a52e9e482aa31659c78eb74159da49366f35694e5d74871f7c77db7fb442f02e142a8a14c699e52725d47331bbeb91524152079344715aaed406efcc9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3242247639b5cf8ee6ac3d13cfabe8
SHA102af5c0814855b8709a8a4016f52e2ab0ab6c9e0
SHA25654c57f5ea43c19bccbde1b1a6f61ba9262b33bd48ddbd140bb175ae573f2c209
SHA5128c331e526cc57ee369e4538168f6315e34996b2beb89025686a47dcadb34b565367739165e9c1856ad9413efaf2a9a2eb17bb3bbc09a211c85a419cac6d09cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb67f462cf151fe963376c093b40e02a
SHA160ca6d9b6b4d6c9abb29b8ce2a252cd772d11642
SHA2565ed4cb1e9937909fbe0caebfc59d79390bab8550f530699f2dd8b14b66684863
SHA512931cab73291fe38dd383a5d94b754f66132fff1564974759ce5bb6c8687e236146ea27c5c8cf06051a8150da0f9ecdf1ffc9cb9dcc41a62d334636ba77db2bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c542adb54ed0bbc372b3a82485a80de
SHA1c8b99a0280bf9896f0aae3a8b8055b47b8f0715e
SHA256fe1d85996e4d878dc7399c988fba147df814dbb97cfecf452ec6bb0206ac0b5e
SHA512cc1498c38902162abaa035d70ef7224ec71d79c7bd9afe4bdb5a69ccff26d197cecf705905a394ed4b3c36735061b45bcb6de82a9e27d78eff933e21643e3874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e8e29ff7d354b09fc07327874b4e17
SHA1ae81cf86827f818297bf28800d786b1cfca2be8c
SHA256f540012deae56b4b7fa6d30dad73d09812a876906868675ad54498281830dedc
SHA51298ce1b15edaae1707d7d8ed0c10ce253c913e49e73289be0c57bf743a10020639e8ee2c2917ac18708f6882837b4930256edda4f8a2b5db0da2537577d00735a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca61c6ebfdebadfe439eac48a06da06
SHA15f34cceb16ef0498ddaff2f903c738d555c6ccb1
SHA2565c63075fddeea54739d945cdb4a12c6393ce8952cc95c38b94accd1331ddf6b4
SHA51254e960fd117e0b03661790232bc0e8206a3fb3c0d9a5d3b982293687fee172c5357cbf9bd890a04435027df197b4e56348b49562d8b5eeb1791f1a30bd26f18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53589ec2e7f6b7aa824f80ea1e16d896c
SHA1b972e9dc665d25151f35783635d8ddc72fee100c
SHA2566e437b8944fc9563277b226fb306e0af5a0ead4a1d97f172149da8d8c74f8d60
SHA512cf466ee0b3901496ecb5a49c11167e656679a239678140ca0fb30632063aa379ddbc0169b327f773cb233979bc08076eda0ac2ddf8496c12006d2a7b9b905ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c3e629823a59f8d93d99baac2105e2
SHA1ffb9d952392ffb251354e93785fba549e442eec2
SHA256a0f73af02c5268bcdb97878d15b8e2813d16999016b2c65bdf23ddad135e3ad9
SHA51294f6b7586dbafbaf21a6aff0ffa90d8a0c276f8193b721589afe1f33eb34fb4ba93d58998b48e28be1656905d02cf1faf464e204479f2b4421e87b314e91a1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51088b469da4919f2bd7cf722d1ba6a7d
SHA12810e731fb3ca2c1765a9274d875be6bd24c3609
SHA256a642a16e4173a36436656ebbd94d6d9f96ab607d3bfb0be40e4bfa210ce272aa
SHA512c469a037ab2304c7a36be2607bed67d5817566b7f24e4aa2f740b21dc7d13c5d6e096e43c717643e69dae4cb6c0ccc77c103e8e0f97d1c3085529ff5767133a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf477c76d5fcf2c3d860e49d3926189c
SHA17a47721183e0f65f21e0a1412463f8da17130c76
SHA256d5c27ce1691065c1a80dd9215ce9f01140358eb6fe01d0ba74bed29f9fb52fac
SHA512650c074b39184744409587c65f30a8c1bf6fa3f75e5eeadd3419031fad54a0cc395b464fe7295447fa06e5972bfe6397eb8fb65856dd56c2b2156d20c83d562c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5c0cfdc1f3a2d258758257502a8a4d108
SHA12596ebd5b3ca90ac82620b5f7840a7901e7fdd10
SHA2564118bf64937c81e32a87fd40b2d1d223c436edc9568919ca3e7adae2e0ca7c47
SHA512ab1115cdb63952e934b4e3b411818c9fcb5384e1007c0bfd62223dedc9cdf0c005b9d805874e06eb46e02f2da4f45d0d5300af5b9c986795f2708ce5b47ab291
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f7c2e2fb-72a4-41e0-8cbc-b1b826d473db.tmp
Filesize5KB
MD52c6b3e61f2f89401c2cb4ff02952cc7c
SHA162064110fbff5c8681e1be4d174de70da370ac39
SHA256cb4abff53ccb009a19b694aa45b852999d16a9aa3f854c778feb6746157615fd
SHA512f34ba44eeb0d07417e859f37250f51fbe41b4ef14547e4585ab7392352ac47a7074e5ee4a00ad1ee62c800d4f3396c699106bb1d2a7a20dfcb0eb9715db3d7e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
40B
MD5f7c9c5e70f0876c02d079a44bbbd10a1
SHA10a97a91a838884c06833aab798ee8418afd98f5a
SHA2561399f32e7d37ae4fae43aeb4f0c14aabad134616ea4a22cfc0a4fe2904401e21
SHA512ffdaaf80aacdfb1538df53e9240bf9167f85c0236dc6b5bf7c02deadd6a530989e4390f1b2c907dc4cb12e81fc6e1dec63960ebd39bcd60fd5ab2592f07cf066