Resubmissions
23/02/2025, 15:05
250223-sglk1a1mbx 10Analysis
-
max time kernel
73s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
tinytask.ini
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tinytask.ini
Resource
win10v2004-20250217-en
General
-
Target
tinytask.ini
-
Size
145B
-
MD5
ceeacd35fe5d94dbf023d3ceddbfdc9f
-
SHA1
d7417facd69ad39d6192e75b0eb82e0b6b53a447
-
SHA256
24f7bda2e6d6eaa5608e027d1fe70958e956e9dc9a52ae1faf18d06982036ee7
-
SHA512
5724bc671dafbf78b643177bf8f9eb2803537c104d7cbd93878561d30d707c1346f2426465ff2592f81d1e5c701cc534b5ddd657040d285191cd6bb557b4e8dc
Malware Config
Signatures
-
Detects Eternity stealer 2 IoCs
resource yara_rule behavioral1/files/0x000400000001d6fe-1155.dat eternity_stealer behavioral1/memory/1500-1157-0x0000000001220000-0x0000000001306000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2392 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 692 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 692 vlc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe 692 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 692 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2668 2012 chrome.exe 31 PID 2012 wrote to memory of 2668 2012 chrome.exe 31 PID 2012 wrote to memory of 2668 2012 chrome.exe 31 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3020 2012 chrome.exe 33 PID 2012 wrote to memory of 3064 2012 chrome.exe 34 PID 2012 wrote to memory of 3064 2012 chrome.exe 34 PID 2012 wrote to memory of 3064 2012 chrome.exe 34 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 PID 2012 wrote to memory of 3060 2012 chrome.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\tinytask.ini1⤵
- Opens file in notepad (likely ransom note)
PID:2392
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a29758,0x7fef6a29768,0x7fef6a297782⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:22⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1384 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1464 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1980 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1988 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2776 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:22⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1276 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3380 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3532 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2748 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3668 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2388 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2772 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3924 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4108 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:82⤵PID:1752
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\Project Eternity.rar2⤵
- Modifies registry class
PID:1600 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\Project Eternity.rar3⤵
- Modifies registry class
PID:2948 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Project Eternity.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:692
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4500 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1980 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=2664 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3668 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=2932 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4172 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4040 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=4116 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=1440 --field-trial-handle=2064,i,4054411012235840878,2052117983893705095,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1324
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2944
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Project Eternity\" -ad -an -ai#7zMap6109:94:7zEvent152481⤵PID:2292
-
C:\Users\Admin\Downloads\Project Eternity\Project Eternity\Eternity.exe"C:\Users\Admin\Downloads\Project Eternity\Project Eternity\Eternity.exe"1⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:2884
-
-
C:\Users\Admin\Downloads\Project Eternity\Project Eternity\Eternity.exe"C:\Users\Admin\Downloads\Project Eternity\Project Eternity\Eternity.exe"1⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7b476a56-462e-447d-9bbe-dcf9b99e1418.tmp
Filesize6KB
MD541102b1e2cc73b050b6142abab668b70
SHA1ddfcdd1d96d46e0b8f758001095d9a442d937192
SHA2563deff6976c531a23ba2f055c2e87e7b20f0d1e32a2e2b07bd4ebe994ff1c9ee9
SHA51286b395181cbd9f8c46ffe734cc728019ef00c1d386ae97b0a0f469915c58ad193f81fd0479b1aef0be486547edb02673a31fd1286aeaba551df23a2a7d8ee1ed
-
Filesize
504B
MD59ee1c794de16a9d969b9eeb403ee0119
SHA188dc21a9c93f38c95a312f1b3e3ddc4277d1dee3
SHA256f7af9b27e5821cb104265f4e57c63657f71e4ac170af30eacf6a89237887c6cf
SHA5122bcf24f7b457ff5658c585ff516e824c935e11ebd0163064a0f7821c0d47672c1fdee00c853e562d8231b334f2ba849886ac99bb8e6944dc1431906b4315c18c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD550e55e847e5cfc7a63d0d86a344c21c7
SHA175b471d57b723d48b8489269ac5d8eba4b7f0df0
SHA256a802f695044d1b76e5d72c4864f5d6775ffab317cfd7075c90394f1c689ada34
SHA51259ef321fded1e8f437c45674fb72e1c1a2199d8e9b5cc3f7d7bac959cbc3475e2561284e1d768ea85afbbb0d643ead93517febf0525a6feacea70a4322e197bc
-
Filesize
363B
MD50d1f1e9aa8e73a1edea110ed0dc525fe
SHA15c9078d09863a1ab5cba0ba82b6ecc62f9c0f35d
SHA2567333dfc9a42b48f0ff2342f3f0c9a8e4d291823a4f3e999c2b7bd63115aea5e4
SHA512aaf19c2caf785df83b8ed7aef9f02a6dadbcb548262ef330e5117264cb754d8470efd002a3e3409278aca03c114a0e0c4d824588ccf5922b5e6976f3824e041c
-
Filesize
690B
MD523bc2136116afa1c251735b0207eefdc
SHA11bc83677881563012f0206aa8b06bc09a0596037
SHA256e6a5ce59a944f7e30e8f8bbfa5ef21f4943c5b573e6c0098ae55648a90cab49f
SHA5126f44d951fa3fec5426d6be4d39a1006df8f677843a3b37ee40cd0d7e20494c4ab77fa45f057e23a0af5380c9daa3097638281e1f0673108b06bb6e6c4211a14e
-
Filesize
2KB
MD57a8e27ea11b7ef10edc6425980ce7fd2
SHA1812d149d67daab909295905787bd21d5e0fd58b2
SHA256c978f8b858ce947a6b7e6a3806cf8b5850f7f370b151a67df61c9955daee23d4
SHA512efade851524fdfe1fbfb85c6dd104880fa73c208d6fd3e941b10e9dfbda2b927547573c1b99d1e48b3d3120905c65f258e451ad0ff28f71fe01cd838897b8f0d
-
Filesize
1KB
MD57ad779753f7d55db05eec1a1e65f46e9
SHA17412a010499c0f86e6800c8ca748c1d6199863b0
SHA256154059997c6cfcfd78d9fac6a17a7702adaa0364a148ae417c0aa0d7134885e7
SHA51280455dac054a7f3ad29e33a54ad3a5c9764d6d68d4f91a4f627db58cda5cbb117cc8c9f25dd32802321ccc6967d4f0a085185a480c274e29144e22d5b01f3ec3
-
Filesize
2KB
MD5c659e70f3d1844d6b9be5b9317ea863e
SHA1f4466273ae9214978f161255fbb7819ce6653288
SHA256aeff772623ffb47ad714d7cc0ad04f9194973701c120932cea1b940d817d1568
SHA512ec45383e01e81b5cbaedab2c8c7a7edcbe296eb2cf254057565a051e23336f9c183ebdb6fefeb9a151e0476e8f9867c253e97bed2dfddfcc4f75eb8f376c049e
-
Filesize
1018B
MD54f265aaf1c2494d85c6b0361dca3b276
SHA159194737d7bf89747628db2ef6770daa552d101e
SHA2560ba83030c0e0c81e0b57650695c6a2f399946d09c224377d4cc2aabc93345c4a
SHA512c9f5cded96446b82e5062c404ce713fb392cfcc12d7fc968f31af2cf9791230afc3e0c0c2eb807f2b566ef7287795795cdff22dbf82a246c97fd4f4cfc4dd254
-
Filesize
7KB
MD59bf0ee9909c0d6c235ca6bd74bdf27b5
SHA13247225ac80f961d85ad500234e88e719bd5d07c
SHA2565abe6d87ca8c8b17b3343ada200870432737f33b649a39c66839993acb4e3159
SHA512d197b745a0b8ff2da3d3c2649cc2c765a84679bcc541fa8b244a0333107f1ca2be6e77c5d8b8b9d2cfb5fecb5cd7b54b46d2fcd71c2d446924ff5f7edec624ad
-
Filesize
7KB
MD5a9cc0d004c27ce726ced7b0e715e724c
SHA1e24ffba1343506fd82ca09b4c71325247949f95d
SHA2565fb3348562ff1d04a630178b8d9241b40f4f361dbfbfe5fe4209f691591fcbcc
SHA51231ae503d3e26c577087d6b65dab8e0cc858327f2bc19ba84119341e2fa65271cdb278a87ebd9e63897d7c45bb3bb2b9f4ccb12e0ebaee2e8bf7242233b4a0933
-
Filesize
7KB
MD5a970358d4f447d7f2e723d3e5bc7f517
SHA1564ad17f35f4231d98a5aca6c91a2ff1ed843c9a
SHA2568a80f4af25eea0c15647489ff7a06600c62032a68515dbea385f62cf6d8a5eeb
SHA512b5f8053df5ad5f0d7a43142c6f7f57013d600d38b34b1f53243beed34c7084f1ff63c9785e0bcf50ed49d46d2ebef7155d16258d54abf4c0359954b3dc331b4b
-
Filesize
5KB
MD52cfde173fff828105a3f8d85468474b1
SHA1e67d22af865ba15c96dc11f75b882cec4304f653
SHA256a585458110a106c864cf019172c494fc594372dce3d887f80bc9f5b495b9700d
SHA51261492c94c3c52edb6863995c4b9550fb57f819270574998b6229156784845a89a67716b3f630cb322ebcb9213ba112e9a77598b3c98df8806cb57bedec27319d
-
Filesize
7KB
MD56c406271a29c9a484e1cb5dc0159ab06
SHA1dc4d318d734f15a858acff80f64e233d94993fc0
SHA256696051894f1428c38673212fe98eac59da2f7622edfc91eee112331eb6c7d17b
SHA5128633c0148c491fd4c43ee90586c7a0693b05fd7e8356aa86fecffdebb5eadf7cc7a7cba2a3720d396d153323914c9046a4231ada40e611f1fe2dd8eac957d64a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
348KB
MD5283113f4d238c4ae96f2c5f1a43fdcae
SHA1a7a7ada1c2a322828ac3856d910fcc59b454006a
SHA256fcdec75f451ffbad10ce043d3977f4e1432cb4809297a876a380dbc23ebfa04f
SHA512071541c8622335b07ba22580b11bb38d432d6401fd56f67460a440195080d33b596c04c578ee4fba179651ebdee772449b22654c0a484ae4707a81e1b4714eef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
Filesize
1.2MB
MD592bb79f7fecb3617d2c9de82dc4fcfcb
SHA1c103bbe417a1c51be43481eb96494dc76aab4065
SHA256133eaae6c5c22dd7536d1181be61fde109c436a0c1952cc4cb328ccbdf35d13e
SHA512ff85fca50cd7739b2d1065e56c163bff5b680af82dc6ef27b760819a033f0bcc817172a0f9f47ef8e8f1c15e3d0bf68bcaa7b3c5babd5bf37bbc9cde01909d22
-
Filesize
117B
MD5c12fc7d52b7dedb073b07b4841b2e4eb
SHA15922f975d6a1befa9f139175b79d1d3f99f7999a
SHA256841e72ace234fda38575b766faa7dd669d08b63faba5e2715051e57022829a06
SHA51241e67561478bf8589ff0108681c2eef8f16bba627025f49474c822ded5863eff9c0f45b855aaa4a503bbc8dc28ee4499790082deee28d4c870c3ad6a9d37e617
-
Filesize
892KB
MD5bc95cb794171f208fdfa855abafeac46
SHA1a6c1154684ecd069dd9fd72e9f178e58a14c5685
SHA256057d9cf8374006100dada04df3449791b28730b4141431f52aef594062a3b361
SHA51214f3329509cfdada94b464ff2c781a70e6215eb9f6d8a215f89b62d3f5a4333d9cab7bd1f7598eb1a8ab5436d353bba83695bb6b7060a2f5ceac277a06ef9a8a