Resubmissions
25/03/2025, 04:35
250325-e717gsvkx9 1025/03/2025, 03:46
250325-ebx5ysz1b1 825/03/2025, 03:44
250325-eafvaazzh1 625/03/2025, 03:40
250325-d8ngcatps8 625/03/2025, 03:37
250325-d6g7jstnz8 625/03/2025, 03:34
250325-d44b1azzdx 825/03/2025, 03:29
250325-d2dzbstnv8 825/03/2025, 02:53
250325-ddd97atkw6 1025/03/2025, 02:47
250325-dadjgstkt3 1025/03/2025, 02:44
250325-c8f7lazwaw 10Analysis
-
max time kernel
69s -
max time network
139s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 03:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Google.com
Resource
win11-20250314-en
General
-
Target
http://Google.com
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 72 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 salinewin.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language salinewin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873480223188104" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1072 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\salinewin.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe Token: SeShutdownPrivilege 1808 chrome.exe Token: SeCreatePagefilePrivilege 1808 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1468 salinewin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 5024 1808 chrome.exe 78 PID 1808 wrote to memory of 5024 1808 chrome.exe 78 PID 1808 wrote to memory of 1512 1808 chrome.exe 79 PID 1808 wrote to memory of 1512 1808 chrome.exe 79 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 3948 1808 chrome.exe 80 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81 PID 1808 wrote to memory of 4136 1808 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Google.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1893dcf8,0x7ffa1893dd04,0x7ffa1893dd102⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1428,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2128 /prefetch:112⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2076,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2260,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2332 /prefetch:132⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4160,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4172 /prefetch:92⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4568,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5096,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5112 /prefetch:142⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5204,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5420 /prefetch:142⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5388,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5404 /prefetch:142⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5384,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5480 /prefetch:142⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5528,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5708,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5712,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4300 /prefetch:142⤵
- NTFS ADS
PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=4128,i,14653802569459090453,490702170212322518,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=6076 /prefetch:102⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:860
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5176
-
C:\Users\Admin\Downloads\salinewin\salinewin.exe"C:\Users\Admin\Downloads\salinewin\salinewin.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f2⤵
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1072
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E81⤵PID:5052
-
C:\Users\Admin\Downloads\salinewin\salinewin-safety.exe"C:\Users\Admin\Downloads\salinewin\salinewin-safety.exe"1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5564dc42028215bc88ea531f2fb67bbdb
SHA19cb2d24ac80f26c693935f6ff8fd751888dccbe4
SHA2564b416858eb1445e4cdb12481442afb31b9fc86a8a3ca55df46d8d516339ce1f0
SHA512a3c61891be47088397b3a6aae5effe5dd1ee77b566517b4b094920bd31bc6da6e9703a6303d00cc61057f86dcdc1b9eec624bfb7fde00eccdf1add4c5710789a
-
Filesize
288B
MD5c8995791bb9d6b9b4f3e7db423315e7b
SHA1de18421ba2c0dde74451fb38224745cff199e082
SHA25622c5758c8f70f1a4204925b973f35dbd9433bb99461d3148208d984047675ad7
SHA512ca5ea8af67dacc2a6722e6765bbd10b45f29a0d88f254f2a4cafa32bc112a071c81f3dd7520eaabbf6fa260bbf7cbd8fda1b4652198a23ae4e6fe04412570bcd
-
Filesize
2KB
MD5098d29e2f03169a3e6cfa335f75dc813
SHA145a984258ded63185cfc61738cc13513963e0f03
SHA256805d8a2a955a107d0cfc832aeb34d83047cf5dfc7db4341d00472f54e8020b70
SHA512768cf383df72caead73841a8e3eca868a90870ad0eb8c5d9a9facafb2f60c912512e15e1ab3343c3baf9a2844b71624ce59e0a5456cc6a7424022292984003fe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\601cf7e4-44d4-45ec-a82d-a7ffd2df616c.tmp
Filesize8KB
MD550719ee44af32a92fa5ec8b5b6537b5b
SHA199aa32e963e89fe1a1d873b86bf3a19e6ae45f79
SHA25606a6151cc59da74d1811d9623d090119b7b7079cc051f13a5ae286978b8d3e2e
SHA51278cc960d3c9a7bda83442824ced789338db2511a7dad86081fabf3730fed7bc091e8f46c0cb5e2cca8dff73c209ea16ff85e8207305ab0d301e683e8e66a7ecb
-
Filesize
9KB
MD5c4b85e03d7cd4b903495c2071c6188f3
SHA18ad5597525232321bfb19b72e7714ee8fed568fb
SHA256f3cd4178d5e905eff40cdad9c006cef1ec54b3d05e145b4093e769663393caa5
SHA512a08e90447d9669957f06828edcff802eaa05204f645e43a65a39ae8277fe57c59e11c062d2edc3ef6b1c131714c323301691c0277b7319f8171d69ef09cfb98f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD52b5849aaada652ed6d5eb25d192fba58
SHA1bdc61200c80275e00821508a0aab0264b55ced4b
SHA2569c49a4d561061c74969ebfd4f5180881fe55cc733cbb780ad51e85f837c9f13d
SHA512fc04a0b15890d90add17cd0f664c61b5499aefeda4ae7d4634b5af9181f4784382c513baa8d7b9d0384a07dae47aede109e3231904e5fcb396c9aa36f7444ec0
-
Filesize
10KB
MD5705a9b12a584f2108a36c21d922b8a29
SHA1802c213cc2605968f2cf89aebe262373316a19e5
SHA25650e82f0fda659b1ce2f1d8b61f28746732b359034fa38e857a466308a9b90008
SHA512d8f29e9a628747d10a069e4788f6a63ae31111d90b9bd6f2926e26042351f3da4d40444f01b789ba20696f0fefeb4fdcf00d134283acbdcd8d7023cdfbcf26fb
-
Filesize
11KB
MD500968025adae27927d80563ff2de300e
SHA1224b6872a142e318179180901b01c858f2e2fb85
SHA256b78a67c5e346f074057ec67c05dc62809d51a1555f6aff0006bbfd33f356dbff
SHA5127c9567bbb55baa4e2bbc43f5357f5016842a49ed25c10c7b7e9dde93a59a232d375405c75d5c71f00f37ce1504f75181a9edd442c44f33a7d25685bda953c59f
-
Filesize
10KB
MD5fb8d6a767d7b27e2fa62d89c64d991a5
SHA13e79bc606bab947361b9079e5af1f2327cdd7050
SHA2563d5196ecd880c957a1975c5abba262b9f96f181503fda75554ab9f45efe6980c
SHA512a820b7d1c2b537d0036325c0c39ea2d1eadd490e541d2142be5349b1ead386ef16476abaeb453c406aafe10f17f6f25d9b6e509c3fc3012e0464ca705826c925
-
Filesize
15KB
MD50c4ee74392bcb9c2651fb89da5d6ea38
SHA13b0c059f0763113bc1f02ff5dcbc7ab421b9bb30
SHA256271186f51c93e49b8e397d63570f77ed64355ad873c825457f56c4be696da869
SHA5120c69717b1882b08f112a904faf5b582497a6ba83dceeb00e15c8522c1557dc55e25ee27713984c27e49a24c9d84606c6cb4edd41168ee16587e07a3402257080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5011906d730efba0f66adb267841068d7
SHA1deb7fb7e790a9317d9eacf368ff34e891477e552
SHA25682b3ed838e867e5b1e22250b147597c9aea29c11601269a9f6344f1520f1256f
SHA512b5c0b254757249548ba70196ef92631e11efd11a509e883c7b35facb4c5a418b16deb7bdef8ccb1fbc06e6505f2498d6b93a0b1ba95c3923d8d1a5bd8cd018ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c870.TMP
Filesize48B
MD537da25b1370a193de637f5d4f13fd4a2
SHA173225582e9ee054b125d80dbfe407fbb8cba1883
SHA2564a43da79056cc9ba2031f777a5a1f8b77eca837f6f35865565ea4f2fcc901bd7
SHA5125a1ca297b389256babda69463bd9be3031af83c4ce430fc4ea2e45e2a1b8ba835bedf1aa950d491ce4a09d00dbd56a826d6b9208410b090bd8fec1fa4fedcaea
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe57f32a.TMP
Filesize140B
MD534f06e7dde35b4bb0e4a10e5be731d65
SHA19e78bf97c887234b2f9a75e1a1644b6055c3bdd7
SHA256f6e8164d78127da7d6109c66d7dd97f2879ccdceb6824db492e29d34ad4e0d6e
SHA5125ca84d93988b818a7f30be52a7571b3d802dad773799be461728d075c9a35e6803c106ae43501afa2f0fee8d358c9e83ee3f6cbe5a9e757423c798bb47e2ccb1
-
Filesize
81KB
MD5f83ce83794c95ddeecbc1f471fa96953
SHA13097e68fce5bbed563671f2b69bd74411a66d6c8
SHA25611f40e0142dee7ceab03f2da83e75edc82d5991a69546e6bc3896c9cac3c5c8c
SHA5125135e5d7e44fdd46666fc6a9b317bbb29f41c7cde50cba16d410e6d948216156a5337b070dd7de5d4f060316f7e29e62ac9e396431050e13dedcaf8e8fca1aec
-
Filesize
80KB
MD5a2b1e762c4d63e8683715b09ff30ed2f
SHA1b714c7b14fa988760b50879cd7d5d4108e5b3aa7
SHA256b5227640ce80f5b9e31fae226b00ddc6d46631f56fbe3a310196c454ab556816
SHA512ab39ed214c5ff82a4822b502d0937e80354d820613e308418e7c5305b9faf4324115d17eb07a728560c10e55803ec14661377f28fa53e9225dbeb39d74cae287
-
Filesize
81KB
MD50410e4bfd882e993728f91c5692318f7
SHA1ef029a1b60071aef14f6283f8ceefd15c77a7c41
SHA256639301681e19e970bdc0474591d94b5eeadbf82e8900169ed9605a0e5c2916ab
SHA512d868710e59385fcc069fb8d186d3216622d3d8e0d0d50ba1d1721a878d81072af2ade82c605778f714d3609aa3d45b143a81716dfab60219bc67e97686b7cc28
-
Filesize
203KB
MD519a966f0b86c67659b15364e89f3748b
SHA194075399f5f8c6f73258024bf442c0bf8600d52b
SHA256b3020dd6c9ffceaba72c465c8d596cf04e2d7388b4fd58f10d78be6b91a7e99d
SHA51260a926114d21e43c867187c6890dd1b4809c855a8011fcc921e6c20b6d1fb274c2e417747f1eef0d64919bc4f3a9b6a7725c87240c20b70e87a5ff6eba563427