Analysis
-
max time kernel
190s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 19:21
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
kutaki
http://91.223.82.87/~ojorobia/laptop/laptop.php
Signatures
-
Kutaki family
-
Drops startup file 10 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe HDFC CHALLAN.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe HDFC CHALLAN.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe HDFC CHALLAN.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe HDFC CHALLAN.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe HDFC CHALLAN.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe HDFC CHALLAN.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe HDFC CHALLAN.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe HDFC CHALLAN.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe HDFC CHALLAN.bat File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe HDFC CHALLAN.bat -
Executes dropped EXE 5 IoCs
pid Process 4972 bajnssfk.exe 3580 bajnssfk.exe 5252 bajnssfk.exe 3272 dfjdtvfk.exe 4772 dfjdtvfk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{49841001-DB8F-3FB2-9151-0FD8A01B687A}\icon.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDFC CHALLAN.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDFC CHALLAN.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bajnssfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDFC CHALLAN.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bajnssfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDFC CHALLAN.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfjdtvfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDFC CHALLAN.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bajnssfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfjdtvfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 4 IoCs
pid Process 2744 taskkill.exe 2832 taskkill.exe 3452 taskkill.exe 4008 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133871448756406188" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\DiagCpl.dll,-15#immutable1 = "Troubleshoot and fix common computer problems." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fvecpl.dll,-2#immutable1 = "Protect your PC using BitLocker Drive Encryption." explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 0c0001008421de39080000000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\srchadmin.dll,-602#immutable1 = "Change how Windows indexes to search faster" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\LogicalViewMode = "2" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12123#immutable1 = "Set firewall security options to help protect your computer from hackers and malicious software." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\usercpl.dll,-1#immutable1 = "User Accounts" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fvecpl.dll,-1#immutable1 = "BitLocker Drive Encryption" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\powercpl.dll,-2#immutable1 = "Conserve energy or maximize performance by choosing how your computer manages power." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\srchadmin.dll,-601#immutable1 = "Indexing Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Children chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\colorcpl.exe,-7#immutable1 = "Change advanced color management settings for displays, scanners, and printers." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\mmsys.cpl,-301#immutable1 = "Configure your audio devices or change the sound scheme for your computer." explorer.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\RADCUI.dll,-15301#immutable1 = "Manage your RemoteApp and Desktop Connections" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\DeviceCenter.dll,-1000#immutable1 = "Devices and Printers" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\DeviceCenter.dll,-2000#immutable1 = "View and manage devices, printers, and print jobs" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\intl.cpl,-3#immutable1 = "Region" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\LogicalViewMode = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fhcpl.dll,-52#immutable1 = "File History" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122#immutable1 = "Windows Defender Firewall" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\devmgr.dll,-4#immutable1 = "Device Manager" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\GroupView = "0" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\Vault.dll,-2#immutable1 = "Manage your Windows credentials." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\SyncCenter.dll,-3001#immutable1 = "Sync files between your computer and network folders" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f706806ee260aa0d7449371beb064c986830000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sdcpl.dll,-100#immutable1 = "Recover copies of your files backed up in Windows 7" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\Vault.dll,-1#immutable1 = "Credential Manager" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll,-1#immutable1 = "Speech Recognition" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\usercpl.dll,-2#immutable1 = "Change user account settings and passwords for people who share this computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\appwiz.cpl,-159#immutable1 = "Programs and Features" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\recovery.dll,-2#immutable1 = "Recovery" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fhcpl.dll,-2#immutable1 = "Keep a history of your files" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\inetcpl.cpl,-4313#immutable1 = "Configure your Internet display and connection settings." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll,-2#immutable1 = "Configure how speech recognition works on your computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\netcenter.dll,-1#immutable1 = "Network and Sharing Center" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\DiagCpl.dll,-1#immutable1 = "Troubleshooting" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\IconSize = "16" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\telephon.cpl,-2#immutable1 = "Configure your telephone dialing rules and modem settings." explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000000000001000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\intl.cpl,-2#immutable1 = "Customize settings for the display of languages, numbers, times, and dates." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\systemcpl.dll,-1#immutable1 = "System" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{D674391B-52D9-4E07-834E-67C98610F39D}\FFlags = "18874433" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\powercpl.dll,-1#immutable1 = "Power Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\systemcpl.dll,-2#immutable1 = "View information about your computer, and change settings for hardware, performance, and remote connections." explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{DE4F0660-FA10-4B8F-A494-068B20B22307}\Mode = "6" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sud.dll,-1#immutable1 = "Default Programs" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\devmgr.dll,-5#immutable1 = "View and update your device hardware settings and driver software." explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5328 explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 3760 chrome.exe 3760 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5328 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 5328 explorer.exe 5328 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 4652 HDFC CHALLAN.bat 4652 HDFC CHALLAN.bat 4652 HDFC CHALLAN.bat 4972 bajnssfk.exe 4972 bajnssfk.exe 4972 bajnssfk.exe 2244 HDFC CHALLAN.bat 2244 HDFC CHALLAN.bat 2244 HDFC CHALLAN.bat 3580 bajnssfk.exe 3580 bajnssfk.exe 3580 bajnssfk.exe 3416 HDFC CHALLAN.bat 3416 HDFC CHALLAN.bat 3416 HDFC CHALLAN.bat 5252 bajnssfk.exe 5252 bajnssfk.exe 5252 bajnssfk.exe 5436 HDFC CHALLAN.bat 5436 HDFC CHALLAN.bat 5436 HDFC CHALLAN.bat 3272 dfjdtvfk.exe 3272 dfjdtvfk.exe 3272 dfjdtvfk.exe 1608 HDFC CHALLAN.bat 1608 HDFC CHALLAN.bat 1608 HDFC CHALLAN.bat 4772 dfjdtvfk.exe 4772 dfjdtvfk.exe 4772 dfjdtvfk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4952 1580 chrome.exe 86 PID 1580 wrote to memory of 4952 1580 chrome.exe 86 PID 1580 wrote to memory of 3468 1580 chrome.exe 87 PID 1580 wrote to memory of 3468 1580 chrome.exe 87 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 1244 1580 chrome.exe 88 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90 PID 1580 wrote to memory of 4972 1580 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://purejoyaroma.com/v1.2/fonts/qanej1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffba451dcf8,0x7ffba451dd04,0x7ffba451dd102⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1520,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2076,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2400,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4296 /prefetch:22⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4776,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5524,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3108 /prefetch:82⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5528,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3124 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5876,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4764,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5752 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=208,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5908,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5748,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5708,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3880,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1216 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im bajnssfk.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4008
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im bajnssfk.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2744
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5252
-
-
C:\Users\Admin\Downloads\HDFC CHALLAN.bat"C:\Users\Admin\Downloads\HDFC CHALLAN.bat"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5436 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:5388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im bajnssfk.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2832
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3272
-
-
C:\Users\Admin\Downloads\HDFC CHALLAN.bat"C:\Users\Admin\Downloads\HDFC CHALLAN.bat"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵
- System Location Discovery: System Language Discovery
PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dfjdtvfk.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3452
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:5328
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cb5720f4714029fbd3e5d097660bbbbe
SHA1c060c9b977743928b7d63837586425a2dc53c88c
SHA25626746c60110bac5ccfa1fc6822805fb73293f685d6816a36a99b70a0f6a62133
SHA512236dfd685457e75d0e3f9a7888c43356687a5877cf291546920d712eb0e80e24f8cbaa5cd58b5e0a86589298ce678864d5fa6f07b64951336ab096d0b22516e9
-
Filesize
2KB
MD5bca9068d5d37b198be81157fa4163ec2
SHA1e4fe02ed6b76e5c5b5addbd59076338241c6088b
SHA256b7f1dc0c420fdbab130cfca04419cb1c7278de8c6b7f4be51210d2c6fdc2d460
SHA5125adc67a387437474e7c0c3cc42efdeb740e2b094dd5ea9582cb66d00861ad2a9d10198c807644cf4a4a1abebee2b14b8cc0512e3a45858382f4d39c743b9104f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD5ef0ed0432f635dd054995e92a36143d7
SHA1d79f09763e7d4d2bd1ee2d44856a300ab70d1373
SHA2562f93f5336afe858babe697a8848f23f0dd2673e520a3c118f4e9839bce3dbca3
SHA512f071e147cf9320975cd09db67f271760bea77dd9447dce3a4db18267e5fa8da90a97844bfd93282c1e766342a97d4c01bf1c0ad15425617543ba3442bad6695b
-
Filesize
11KB
MD52a6d9c73baebb3bc3870e29d90a92963
SHA1da38e7b85cae207b7f0c181b02e7974af483d417
SHA25658c3635f4327f26dbbfa508cbb41222fc5fa39daf4b560622ceee98dc822ee04
SHA512ddc371dd94bb539453402528ea59bce21fdbdcd091c340e2553c8658e892ddc25e021d35c19154b4f01eefed9a52d774dfe3727d741c9b7e6ac89539ea4182ed
-
Filesize
15KB
MD5328c996b51b6cd31ae0b3302686b612d
SHA12830f5d4e26278403aaf6b36de2c4273100265ac
SHA256d036f2520fe83f5001b255f7008ebb03622edf5d1c4c9a89a786e31a1d321030
SHA512abae3ccc6a0ff87b5ba8c8b5ab90f8af02ad9419a2d1f4a7259003d76fad600a81b8e953ac08ce93e00d85324041fb3a446fbe97b3b02c0a3863f2e645c31070
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD536912dc9ec8a3a419bc260f2a984a197
SHA1945815fe1da8a16e36d95eb0afba03e1bbea0257
SHA256a17c576a9974c1adf91469f16192d36749e7ec999be0824709f8690d63cfa2bd
SHA51279a27f11ef9cc6efcd4674939e6922e929fadc01aa3088d708e746de52712e0a9dbe9e98c19daa763241d127c273cfab118f9d47465c18fa22615cb2629063af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581102.TMP
Filesize48B
MD5532255d829460c56deb721b362e6cb5d
SHA180c42794b930aa1101b7a66b2f72fba778041ec3
SHA2568447bfc5040e0680642be770fb19575ff9ced8e6fd06fa911aa6670adff7fc88
SHA51228c9cffc630e67f7999eb27c58c0d6fcf71874d33e8e1fa776557e225c2a0bb7508869c8b48e174f3e82d811e6a85be12180d38510acffb60331ff8145cf1fe5
-
Filesize
80KB
MD5b8eeabac8d29b45f0d9588210dce5340
SHA1230220ced1bba97717b15d9fa3a1f6b26930e774
SHA25625117ba90bc324f6065840e4662053745af37e55f8d15a87a0e40506423c355e
SHA512a14d70399f8ecb1ae9f6121f4433446214f360e2c74cdebfe062b8ef64119c961c7418389b124e061956ef5cb15b4f773cc768d5656e5cf03e3a3071a4ab9aae
-
Filesize
81KB
MD597ae9938a44dc3871c83742f9276bf91
SHA1b825e2450eca1b5a52005089a802096d3f02a2fd
SHA256c1798a0405e2fb81d453041be5e54dbf969864a88f6bba73fb0530baf7be3558
SHA5127474bb064b1b4c503b689084079f40206d0b9c17bd61ec56c1d2d87fe8b2b9067e91e10bf7a67d45f21e519d6f121781cece33e76fde0f81ebae30b6c55a79ee
-
Filesize
81KB
MD51b5969d04c8e049ec025bc66c8782c99
SHA16875d9b277f80554a6b1222e522c59a5e296b6f7
SHA256d7fb755a29250fd1ad0c6761702ca79d985bb5e2e085190f61fe9161c624a10f
SHA51290e93bb463a379ea48c10946e8f4328faaf019f431586b58dd5da5aa0362bd0404c06ff113fcee16f11af8f2f1dbfc17c5fb306023d4fbe4c57bd139133526f4
-
Filesize
500KB
MD50bf5903099c9aa35783dc0bb980e7ebe
SHA1f9bdd08f52948dd7429dc127f56f6fa08b278ee0
SHA25660694d9024e1988c2a5a1ad4e73796ebc75d46c2020444dfdde4ec7d9751f801
SHA5124d564771cb5f006316c837cef4c09843ead21569f392674dc418481f00da6a6143886074788ce78e4ccf32ac3e84404c6ca89a86f8bbe4dbca4fae8fff57fad5
-
Filesize
333KB
MD557f4405f389bc9b25d48667509166738
SHA170179157b9e24fd4295eeb3e586fb650aec7dc56
SHA2565f66a88744746018929af0add4d19434af4759be047cfed6aec018471673b768
SHA512d611dd3c6c46e5292e153e411c1cc2902ceece0045253090e0885366b6ed1c535aea8f2f70df29fdbc413cd3a25bd2f3cbbb27e450dd152cfb8362852e9b2ecb