Resubmissions

25/03/2025, 21:22

250325-z7241awn18 10

25/03/2025, 21:19

250325-z553wasxfy 10

25/03/2025, 21:15

250325-z39chswnx3 10

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/03/2025, 21:19

General

  • Target

    60eafa94ceb03b819234435aebd7784597eb212f6a796a4a1052b19beb854a30.js

  • Size

    1.3MB

  • MD5

    34686f47e7d2f9206fd5dab3814ed870

  • SHA1

    447fbec5fb2ffe97d839ce8ed56a75383dca02c1

  • SHA256

    60eafa94ceb03b819234435aebd7784597eb212f6a796a4a1052b19beb854a30

  • SHA512

    092c9f37b44781031cd731a7c8fd358a3de4ac8be1192176bbb558e87a313c664918cc895e6c1971138342fb4bf24423afb6398ef6431d05c24f28a7c8788076

  • SSDEEP

    6144:Zi9kVg2B54Ah7JHNhbvxPKf1wGYew0CATXH4R+LcKzwi1w3R1V8KyIvSzxRUXkjN:ZA

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

3300

C2

addlock.mitial.at/api1

Attributes
  • build

    250141

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    730

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\60eafa94ceb03b819234435aebd7784597eb212f6a796a4a1052b19beb854a30.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\AiJkqydZbl.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\regsvr32.exe
        -s C:\Users\Admin\AppData\Local\Temp\\AiJkqydZbl.txt
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:5780
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82730dcf8,0x7ff82730dd04,0x7ff82730dd10
      2⤵
        PID:4488
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1892,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2108 /prefetch:11
        2⤵
          PID:5024
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2080,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2076 /prefetch:2
          2⤵
            PID:5032
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2392,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2352 /prefetch:13
            2⤵
              PID:2420
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3200 /prefetch:1
              2⤵
                PID:4884
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3252 /prefetch:1
                2⤵
                  PID:5244
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4152,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4168 /prefetch:9
                  2⤵
                    PID:572
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4596,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4608 /prefetch:1
                    2⤵
                      PID:280
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5328,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5344 /prefetch:14
                      2⤵
                        PID:5952
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5396,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5420 /prefetch:14
                        2⤵
                          PID:1224
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5572,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5408 /prefetch:1
                          2⤵
                            PID:3492
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5504,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5836 /prefetch:1
                            2⤵
                              PID:3692
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3484,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3216 /prefetch:1
                              2⤵
                                PID:1904
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3424,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4636 /prefetch:1
                                2⤵
                                  PID:1200
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3344,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3336 /prefetch:1
                                  2⤵
                                    PID:3484
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3240,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5972 /prefetch:1
                                    2⤵
                                      PID:4212
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3384,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3416 /prefetch:1
                                      2⤵
                                        PID:1056
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4664,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2500 /prefetch:14
                                        2⤵
                                          PID:4720
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=2424,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5500 /prefetch:14
                                          2⤵
                                            PID:1968
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5448 /prefetch:14
                                            2⤵
                                              PID:4380
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4512,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5948 /prefetch:1
                                              2⤵
                                                PID:5932
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=4696,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3216 /prefetch:1
                                                2⤵
                                                  PID:1380
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3464,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5472 /prefetch:1
                                                  2⤵
                                                    PID:6124
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5260,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3764 /prefetch:1
                                                    2⤵
                                                      PID:2660
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=3356,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3372 /prefetch:10
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3184
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=3252,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3276 /prefetch:1
                                                      2⤵
                                                        PID:5256
                                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                      1⤵
                                                        PID:5016
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                        1⤵
                                                          PID:2852
                                                        • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                                                          "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                                                          1⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2280
                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                          1⤵
                                                          • Modifies Internet Explorer settings
                                                          • Modifies Internet Explorer start page
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2000
                                                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:17410 /prefetch:2
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies Internet Explorer settings
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:5592
                                                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:668712 /prefetch:2
                                                            2⤵
                                                              PID:5700
                                                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:668714 /prefetch:2
                                                              2⤵
                                                                PID:4684
                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                              "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                              1⤵
                                                              • Modifies Internet Explorer settings
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5056
                                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5056 CREDAT:17410 /prefetch:2
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2336
                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                              "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                              1⤵
                                                              • Modifies Internet Explorer settings
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5472
                                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5472 CREDAT:17410 /prefetch:2
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies Internet Explorer settings
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5728
                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                              "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                              1⤵
                                                              • Modifies Internet Explorer settings
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4572
                                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:2
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies Internet Explorer settings
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2088

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                              Filesize

                                                              649B

                                                              MD5

                                                              994ae49de69c8e499b1c65a8de530db0

                                                              SHA1

                                                              b9c0503dfbc13eb2adf738b2e6a4d4beb87c4557

                                                              SHA256

                                                              5021990a27023bd91009992ea65dfc27b440ee2c0cf8f9ea84a9db97849620ab

                                                              SHA512

                                                              3117b1c3bbbd451002a217231ff2dd79b4e85a5faeb5b88d10380884fd38f7ff170c9faaa0bad6627699e3a87c72158ff14e0d412dec671b02c65d762c8b4977

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              627f9b6a900926f902fdf30a6ed4a3de

                                                              SHA1

                                                              156456f7b0c459948a6b18aaec6d9ebf31a2a5e9

                                                              SHA256

                                                              a2eb1b814bd8788ad82fa8ad57e68101e1adba1b46d28e1d19327ce16c46bd24

                                                              SHA512

                                                              e2d20b1c4654a3b389c82e4762628c7f20135bac9cbc1f949290b054f6c32a8c68d1354625a2758fd6780e77f0183a7f335682995581b24f103a3c1f4452cbfe

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                              Filesize

                                                              2B

                                                              MD5

                                                              d751713988987e9331980363e24189ce

                                                              SHA1

                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                              SHA256

                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                              SHA512

                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              b7db39e0ab2a45e1f5e20c207444b3ab

                                                              SHA1

                                                              432c17e546eb1c64f21ff1d664f1e674d7a5b271

                                                              SHA256

                                                              006fd201f717ed5d0a640f0ef1d4cf6f8f15fbe75e040ad771c3c9654748f3a5

                                                              SHA512

                                                              3960e7c81254c8780954c55bb767d1ef84ea52e345949f4bf8cfcf575d6c00bfa3df1d413d5974474c9eafa5a4d3b74db444741d59cab0017f2b5bfb7a7302d1

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              4ea4fac3129c0e1a3443c15915f2d28c

                                                              SHA1

                                                              67c589266ccc80b59be8daed7efffb2316668522

                                                              SHA256

                                                              ad072c916b4bcbd6622f4703774f5dd39d8db86e736d0e66f4a6f9f0e51f9b57

                                                              SHA512

                                                              e361d7e117979d2e18530408608ddaf13507abb58e70842201a7db81eb1205c011c633bdeab33053aaca2818a839993fcc779b1368d34d2c990f1bbf9bb78414

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              8caa37ca443927c2d2567ef43cec8f93

                                                              SHA1

                                                              889d4261c46ae1f87b7b6b8ae1e8080d28aaffb2

                                                              SHA256

                                                              7d801b2323666d29cdfa6dbda785311e5bcf72fd4ebb0cdbe5059c3a8b38026b

                                                              SHA512

                                                              753ca8a57e93a4b8e5e1877eab31c10757d17fb275337a28b3d5ba9b4636a93f5a5b76b79ca79ded708321f8cae28da01a58f27dc7cd045db8187380671eebb6

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              4433b9742a2f8503b67d0bac2c0e8bca

                                                              SHA1

                                                              13f5c8af12c765a755b77ceb1ed0e1bbdc0d589e

                                                              SHA256

                                                              05537e954f0fa1b2a6fc0cdf7309edfad8c4cb21d5e38e52b9aecb85a7e998e3

                                                              SHA512

                                                              c5899b7707f60c88220e2d5f8bfe63305f337e02908273b9f90e1986a7c0d5e7ae202fd1a083fc813e512022d6b2d24ad04da3a5b1fffd0bd889bebb3ee3c3e9

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              6db02c9fe64719212cd648b1b8c0b6cd

                                                              SHA1

                                                              4a4bb6c228efcee3b74eec72aeded1e64719e7f6

                                                              SHA256

                                                              252a071b0eb9690fa5254859386af761ba698658ac7ee862b4921a3fe1700751

                                                              SHA512

                                                              b8346a0978cf09aa6ec6c98dd9e22625775caadb85a4d92b1c2a3974f4066b3e7da2de23c7531ae5fcebc066e754630cdc1a75a71fb48a2254e6f30c19d9131b

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                              Filesize

                                                              72B

                                                              MD5

                                                              feaad0e4903dc1e53965331653ed8006

                                                              SHA1

                                                              40b98646371baa62b6dcd80e1020f0d3dfb95376

                                                              SHA256

                                                              4bb352a54672c5fe14fbfdf2cb3826d139a52d86856748ea324df63bb91b19c7

                                                              SHA512

                                                              b75d5679b993f38b645fbb1f3b67bf585101bbb5f09f302179a6b9fe982c97223d1269fd93266db0ee0e0dd5d1ffa5e84065c975bca0e55a576241b6ff90e01a

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57cb6e.TMP

                                                              Filesize

                                                              48B

                                                              MD5

                                                              08a3038eb44a04cc516ac54e21e9cc7f

                                                              SHA1

                                                              974f87be60dec6d1234b8da798ea78d8dbd0a398

                                                              SHA256

                                                              d8866183be0cbbfa3c3f485a95667af98f6be7d8841633b668377a79ddedaa73

                                                              SHA512

                                                              f5d7e48177bc434ef30b53635d1b8891761f283becaac1eaeb34bbc661995808f0be91dabd045c31d8ec5e8b0a8a768dbe191949bc7c68c7bebe1eac0e7db248

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              155KB

                                                              MD5

                                                              fdab4e452ac27ee1312e99437805adae

                                                              SHA1

                                                              97c93ff356cc91ca44013e0b0e22353fe97638f8

                                                              SHA256

                                                              3793297eadbd53faab3c3ad8c8711bc73c48791e6172143bb5f3707e53f79e73

                                                              SHA512

                                                              36114cee5ff555c394f5cd1640ba674963cc26b2a07f25c73e06aa0a33cbfe57cf2a296600b4869c86eb40f0cb2d078051fa8b6096cfbaa83af3caeb0c8a2e02

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              80KB

                                                              MD5

                                                              9840d1c83d20410b131f5806dc981382

                                                              SHA1

                                                              46d73be6c25c68c638a36c8dd66c8f33705eb500

                                                              SHA256

                                                              e3dd00e48c17dbd21bea4d5fffb9272dc7cb799d7e0406acd242c0bdfb97aa8b

                                                              SHA512

                                                              23c00bff7414e664b904ee3cdbcba8c1daf5388a0346b123501cc891fb8fc509fe72727ec99cd830484e2b6c9c76ac9bb254299b36c37606c45650615b5ef90b

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              155KB

                                                              MD5

                                                              decc8bab92dc20591deb996aa25849e2

                                                              SHA1

                                                              ce4a11431886d5f77484a909b431278d9580ca66

                                                              SHA256

                                                              06eacbff9fe84f38cee27f66d0a1bfbbe987f0dd2559fcd21f40c209a8c0b39e

                                                              SHA512

                                                              6683cf6229605f88c66c01407642a2932b0d1abb5bddfd50ef5107ae12c3b273e8911767ff54006a7aa77dc38324958a4dfec1861b81599319f855db2b182f07

                                                            • C:\Users\Admin\AppData\Local\Temp\AiJkqydZbl.txt

                                                              Filesize

                                                              204KB

                                                              MD5

                                                              952bc67de7e7e40d3938ae5d9118bde9

                                                              SHA1

                                                              c9479c7cbe08c9b9c8d022f0a9dc0d64277936e8

                                                              SHA256

                                                              52b9735c9182c90dcf54bb2d1ae287bd702417070fa3dd403232b0a5c26b857f

                                                              SHA512

                                                              667a6894b3e772822a926e6543819f351639436e6a8d98f7bc6238f77c2d3d62227ab11b3beb007326437317c52e690a62f539ce196258f6c07192acbb1565ea

                                                            • C:\Users\Admin\AppData\Local\Temp\~DFF05C81F346CDB8B7.TMP

                                                              Filesize

                                                              16KB

                                                              MD5

                                                              74395d2c429ad25faa25b556ae77e06b

                                                              SHA1

                                                              f86922f673bbd97950799060f9cab7325eb3b3da

                                                              SHA256

                                                              feb51d3552e3f1007d203c2869af55424cd86a75c0be1448967deadee4f3b72f

                                                              SHA512

                                                              738d2fa674ca439e9e034f4fdcdde40875a9070ed4a9a9f0340853c72a4648a4ef0d1e79bc929d6e8509ccff08c40ce7719920f478568d5975066b2ed5f0c676

                                                            • memory/5780-89-0x0000000002280000-0x00000000023AE000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/5780-90-0x00000000008D0000-0x00000000008E0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/5780-4-0x0000000002280000-0x00000000023AE000-memory.dmp

                                                              Filesize

                                                              1.2MB