Resubmissions
25/03/2025, 21:22
250325-z7241awn18 1025/03/2025, 21:19
250325-z553wasxfy 1025/03/2025, 21:15
250325-z39chswnx3 10Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 21:19
Static task
static1
General
-
Target
60eafa94ceb03b819234435aebd7784597eb212f6a796a4a1052b19beb854a30.js
-
Size
1.3MB
-
MD5
34686f47e7d2f9206fd5dab3814ed870
-
SHA1
447fbec5fb2ffe97d839ce8ed56a75383dca02c1
-
SHA256
60eafa94ceb03b819234435aebd7784597eb212f6a796a4a1052b19beb854a30
-
SHA512
092c9f37b44781031cd731a7c8fd358a3de4ac8be1192176bbb558e87a313c664918cc895e6c1971138342fb4bf24423afb6398ef6431d05c24f28a7c8788076
-
SSDEEP
6144:Zi9kVg2B54Ah7JHNhbvxPKf1wGYew0CATXH4R+LcKzwi1w3R1V8KyIvSzxRUXkjN:ZA
Malware Config
Extracted
gozi
Extracted
gozi
3300
addlock.mitial.at/api1
-
build
250141
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
730
Signatures
-
Gozi family
-
Loads dropped DLL 2 IoCs
pid Process 5780 regsvr32.exe 5780 regsvr32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\ImageStoreRandomFolder = "eyrcqe2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c578b3cb9ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\Start Page_TIMESTAMP = 58fd96a1cb9ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "817084385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11005683-09BF-11F0-B17F-E230BB0D1833} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000089a4c6b8ccc0564e8dcc4256ec3842e3000000000200000000001066000000010000200000000836b6d69e341e8e98b5ecf92f0fba2a781102ff2aa13269d77106e9aa752e9b000000000e8000000002000020000000ee9fec3e3ad1871c6b09ae7fe72dbb1b63de35442a414d8605f1792018f9f2ae20000000520b0fc5c92a665e610d31363cabc259d9db091c0b826171046048cb8ad653f44000000003acdafbc1d407ee135a32ae40c44135d75309de8032193e9e3717f92c1ec62f7b64112c7bd96d9ce5d2e63cbc2174d550cf56f1628c8fbf5dd5a2a8569cbde6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{043B9B09-09BF-11F0-B17F-E230BB0D1833} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F77E0469-09BE-11F0-B17F-E230BB0D1833} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31170028" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE952FF7-09BE-11F0-B17F-E230BB0D1833} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MAO Settings\DiscardLoadTimes = 88c9cbac2595db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.22000.1\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\MAO Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Suggested Sites iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Suggested Sites\DataStreamEnabledState = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://go.microsoft.com/fwlink/p/?LinkId=255141" iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133874111588937780" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 3184 chrome.exe 3184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 2000 iexplore.exe 5056 iexplore.exe 5472 iexplore.exe 4572 iexplore.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 5592 IEXPLORE.EXE 5592 IEXPLORE.EXE 5056 iexplore.exe 5056 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 5472 iexplore.exe 5472 iexplore.exe 5728 IEXPLORE.EXE 5728 IEXPLORE.EXE 4572 iexplore.exe 4572 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1504 2660 wscript.exe 78 PID 2660 wrote to memory of 1504 2660 wscript.exe 78 PID 1504 wrote to memory of 5780 1504 regsvr32.exe 79 PID 1504 wrote to memory of 5780 1504 regsvr32.exe 79 PID 1504 wrote to memory of 5780 1504 regsvr32.exe 79 PID 4504 wrote to memory of 4488 4504 chrome.exe 83 PID 4504 wrote to memory of 4488 4504 chrome.exe 83 PID 4504 wrote to memory of 5024 4504 chrome.exe 85 PID 4504 wrote to memory of 5024 4504 chrome.exe 85 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 5032 4504 chrome.exe 86 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 PID 4504 wrote to memory of 2420 4504 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\60eafa94ceb03b819234435aebd7784597eb212f6a796a4a1052b19beb854a30.js1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\AiJkqydZbl.txt2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\AiJkqydZbl.txt3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5780
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82730dcf8,0x7ff82730dd04,0x7ff82730dd102⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1892,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2108 /prefetch:112⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2080,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2392,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2352 /prefetch:132⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4152,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4168 /prefetch:92⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4596,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5328,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5344 /prefetch:142⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5396,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5420 /prefetch:142⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5572,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5504,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3484,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3424,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3344,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3240,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3384,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4664,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2500 /prefetch:142⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=2424,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5500 /prefetch:142⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5448 /prefetch:142⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4512,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=4696,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3464,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5260,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=3356,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3372 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=3252,i,8585943766677715665,284462978803768987,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2852
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:2280
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5592
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:668712 /prefetch:22⤵PID:5700
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:668714 /prefetch:22⤵PID:4684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5056 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5472 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5728
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5994ae49de69c8e499b1c65a8de530db0
SHA1b9c0503dfbc13eb2adf738b2e6a4d4beb87c4557
SHA2565021990a27023bd91009992ea65dfc27b440ee2c0cf8f9ea84a9db97849620ab
SHA5123117b1c3bbbd451002a217231ff2dd79b4e85a5faeb5b88d10380884fd38f7ff170c9faaa0bad6627699e3a87c72158ff14e0d412dec671b02c65d762c8b4977
-
Filesize
2KB
MD5627f9b6a900926f902fdf30a6ed4a3de
SHA1156456f7b0c459948a6b18aaec6d9ebf31a2a5e9
SHA256a2eb1b814bd8788ad82fa8ad57e68101e1adba1b46d28e1d19327ce16c46bd24
SHA512e2d20b1c4654a3b389c82e4762628c7f20135bac9cbc1f949290b054f6c32a8c68d1354625a2758fd6780e77f0183a7f335682995581b24f103a3c1f4452cbfe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5b7db39e0ab2a45e1f5e20c207444b3ab
SHA1432c17e546eb1c64f21ff1d664f1e674d7a5b271
SHA256006fd201f717ed5d0a640f0ef1d4cf6f8f15fbe75e040ad771c3c9654748f3a5
SHA5123960e7c81254c8780954c55bb767d1ef84ea52e345949f4bf8cfcf575d6c00bfa3df1d413d5974474c9eafa5a4d3b74db444741d59cab0017f2b5bfb7a7302d1
-
Filesize
11KB
MD54ea4fac3129c0e1a3443c15915f2d28c
SHA167c589266ccc80b59be8daed7efffb2316668522
SHA256ad072c916b4bcbd6622f4703774f5dd39d8db86e736d0e66f4a6f9f0e51f9b57
SHA512e361d7e117979d2e18530408608ddaf13507abb58e70842201a7db81eb1205c011c633bdeab33053aaca2818a839993fcc779b1368d34d2c990f1bbf9bb78414
-
Filesize
11KB
MD58caa37ca443927c2d2567ef43cec8f93
SHA1889d4261c46ae1f87b7b6b8ae1e8080d28aaffb2
SHA2567d801b2323666d29cdfa6dbda785311e5bcf72fd4ebb0cdbe5059c3a8b38026b
SHA512753ca8a57e93a4b8e5e1877eab31c10757d17fb275337a28b3d5ba9b4636a93f5a5b76b79ca79ded708321f8cae28da01a58f27dc7cd045db8187380671eebb6
-
Filesize
10KB
MD54433b9742a2f8503b67d0bac2c0e8bca
SHA113f5c8af12c765a755b77ceb1ed0e1bbdc0d589e
SHA25605537e954f0fa1b2a6fc0cdf7309edfad8c4cb21d5e38e52b9aecb85a7e998e3
SHA512c5899b7707f60c88220e2d5f8bfe63305f337e02908273b9f90e1986a7c0d5e7ae202fd1a083fc813e512022d6b2d24ad04da3a5b1fffd0bd889bebb3ee3c3e9
-
Filesize
15KB
MD56db02c9fe64719212cd648b1b8c0b6cd
SHA14a4bb6c228efcee3b74eec72aeded1e64719e7f6
SHA256252a071b0eb9690fa5254859386af761ba698658ac7ee862b4921a3fe1700751
SHA512b8346a0978cf09aa6ec6c98dd9e22625775caadb85a4d92b1c2a3974f4066b3e7da2de23c7531ae5fcebc066e754630cdc1a75a71fb48a2254e6f30c19d9131b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5feaad0e4903dc1e53965331653ed8006
SHA140b98646371baa62b6dcd80e1020f0d3dfb95376
SHA2564bb352a54672c5fe14fbfdf2cb3826d139a52d86856748ea324df63bb91b19c7
SHA512b75d5679b993f38b645fbb1f3b67bf585101bbb5f09f302179a6b9fe982c97223d1269fd93266db0ee0e0dd5d1ffa5e84065c975bca0e55a576241b6ff90e01a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57cb6e.TMP
Filesize48B
MD508a3038eb44a04cc516ac54e21e9cc7f
SHA1974f87be60dec6d1234b8da798ea78d8dbd0a398
SHA256d8866183be0cbbfa3c3f485a95667af98f6be7d8841633b668377a79ddedaa73
SHA512f5d7e48177bc434ef30b53635d1b8891761f283becaac1eaeb34bbc661995808f0be91dabd045c31d8ec5e8b0a8a768dbe191949bc7c68c7bebe1eac0e7db248
-
Filesize
155KB
MD5fdab4e452ac27ee1312e99437805adae
SHA197c93ff356cc91ca44013e0b0e22353fe97638f8
SHA2563793297eadbd53faab3c3ad8c8711bc73c48791e6172143bb5f3707e53f79e73
SHA51236114cee5ff555c394f5cd1640ba674963cc26b2a07f25c73e06aa0a33cbfe57cf2a296600b4869c86eb40f0cb2d078051fa8b6096cfbaa83af3caeb0c8a2e02
-
Filesize
80KB
MD59840d1c83d20410b131f5806dc981382
SHA146d73be6c25c68c638a36c8dd66c8f33705eb500
SHA256e3dd00e48c17dbd21bea4d5fffb9272dc7cb799d7e0406acd242c0bdfb97aa8b
SHA51223c00bff7414e664b904ee3cdbcba8c1daf5388a0346b123501cc891fb8fc509fe72727ec99cd830484e2b6c9c76ac9bb254299b36c37606c45650615b5ef90b
-
Filesize
155KB
MD5decc8bab92dc20591deb996aa25849e2
SHA1ce4a11431886d5f77484a909b431278d9580ca66
SHA25606eacbff9fe84f38cee27f66d0a1bfbbe987f0dd2559fcd21f40c209a8c0b39e
SHA5126683cf6229605f88c66c01407642a2932b0d1abb5bddfd50ef5107ae12c3b273e8911767ff54006a7aa77dc38324958a4dfec1861b81599319f855db2b182f07
-
Filesize
204KB
MD5952bc67de7e7e40d3938ae5d9118bde9
SHA1c9479c7cbe08c9b9c8d022f0a9dc0d64277936e8
SHA25652b9735c9182c90dcf54bb2d1ae287bd702417070fa3dd403232b0a5c26b857f
SHA512667a6894b3e772822a926e6543819f351639436e6a8d98f7bc6238f77c2d3d62227ab11b3beb007326437317c52e690a62f539ce196258f6c07192acbb1565ea
-
Filesize
16KB
MD574395d2c429ad25faa25b556ae77e06b
SHA1f86922f673bbd97950799060f9cab7325eb3b3da
SHA256feb51d3552e3f1007d203c2869af55424cd86a75c0be1448967deadee4f3b72f
SHA512738d2fa674ca439e9e034f4fdcdde40875a9070ed4a9a9f0340853c72a4648a4ef0d1e79bc929d6e8509ccff08c40ce7719920f478568d5975066b2ed5f0c676