Windows
Analysis Report
Kodiak Hub Procurement Ltd Project portfolio 2025.docx.doc
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected landing page (webpage, office document or email)
Document exploit detected (process start blacklist hit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Sigma detected: Legitimate Application Dropped Archive
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected WebBrowserPassView password recovery tool
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Execution From GUID Like Folder Names
Too many similar processes found
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w11x64_office
WINWORD.EXE (PID: 7428 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\W INWORD.EXE " /Automat ion -Embed ding MD5: A9F0EC89897AC6C878D217DFB64CA752) unarchiver.exe (PID: 3304 cmdline:
"C:\Window s\System32 \unarchive r.exe" "C: \Users\use r\AppData\ Local\Temp \{8B4742D0 -AA74-4FD3 -8BB8-6754 74C23405}\ {A4BDC57A- 8FEA-431D- 86EC-4FAFF B5D4D02}\T he key res ponsibilit ies Doc .z ip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2) 7za.exe (PID: 6868 cmdline:
"C:\Window s\System32 \7za.exe" x -pinfect ed -y -o"C :\Users\us er\AppData \Local\Tem p\co2gbwyw .c4i" "C:\ Users\user \AppData\L ocal\Temp\ {8B4742D0- AA74-4FD3- 8BB8-67547 4C23405}\{ A4BDC57A-8 FEA-431D-8 6EC-4FAFFB 5D4D02}\Th e key resp onsibiliti es Doc .zi p" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C) conhost.exe (PID: 3044 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) cmd.exe (PID: 5868 cmdline:
"cmd.exe" /C "C:\Use rs\user\Ap pData\Loca l\Temp\co2 gbwyw.c4i\ The key re sponsibili ties Doc . exe" MD5: 7B2C2B671D3F48A01B334A0070DEC0BD) conhost.exe (PID: 5288 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) The key responsibilities Doc .exe (PID: 6420 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\co2gbw yw.c4i\The key respo nsibilitie s Doc .exe " MD5: 180894D8274364D48640A3A89D951C33) cmd.exe (PID: 6948 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 2776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9184 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6908 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 4796 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 3972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6332 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 3624 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 6932 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6312 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6672 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 6748 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 7004 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 1336 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 6336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6176 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6372 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 4364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6440 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6168 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 6612 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6276 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 7056 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 7112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 7196 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 4956 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 3092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 7632 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6156 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 5732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 6284 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6116 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 6464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 7416 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6344 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 7220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 7940 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 7368 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 7440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8072 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 7508 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 7584 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 5552 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 7776 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 7800 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 4108 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8080 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 2112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8240 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 6056 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 2696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 1756 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 3932 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 4904 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8384 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 7580 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8400 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8248 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8424 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) Conhost.exe (PID: 8292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) cmd.exe (PID: 8312 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8572 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8376 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8692 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8476 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8632 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8536 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8560 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8740 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8640 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8648 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8764 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8656 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 8796 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8728 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 9076 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8836 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 9056 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 8944 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 8976 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 3656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9424 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9592 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 2216 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) cmd.exe (PID: 9048 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 9088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Chrom.exe (PID: 9212 cmdline:
.\Chrom.ex e /stext . \output.tx t MD5: 2024EA60DA870A221DB260482117258B) cmd.exe (PID: 9136 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 9180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) cmd.exe (PID: 4224 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Wind ows\System 32\windown .bat" " MD5: 428CEC6B0034E0F183EB5BAE887BE480) conhost.exe (PID: 5272 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 8676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 3488 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 7028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9248 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 4480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 1948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 10184 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9148 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 3540 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9124 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 2820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 3696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 5528 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 4880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 2236 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 10216 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6380 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 1248 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 3696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 8504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 5996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 8640 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 8068 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9508 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 6672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 2480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) Conhost.exe (PID: 9860 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) unarchiver.exe (PID: 9192 cmdline:
"C:\Window s\System32 \unarchive r.exe" "C: \Users\use r\AppData\ Local\Temp \{8B4742D0 -AA74-4FD3 -8BB8-6754 74C23405}\ {A4BDC57A- 8FEA-431D- 86EC-4FAFF B5D4D02}\T he key res ponsibilit ies Doc .z ip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2) 7za.exe (PID: 1380 cmdline:
"C:\Window s\System32 \7za.exe" x -pinfect ed -y -o"C :\Users\us er\AppData \Local\Tem p\bbjvvwyq .lun" "C:\ Users\user \AppData\L ocal\Temp\ {8B4742D0- AA74-4FD3- 8BB8-67547 4C23405}\{ A4BDC57A-8 FEA-431D-8 6EC-4FAFFB 5D4D02}\Th e key resp onsibiliti es Doc .zi p" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C) conhost.exe (PID: 3244 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
Click to see the 71 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
JoeSecurity_WebBrowserPassView | Yara detected WebBrowserPassView password recovery tool | Joe Security | ||
Click to see the 62 entries |
System Summary |
---|
Source: | Author: frack113, Florian Roth: |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Code function: | 19_2_00407687 |
Phishing |
---|
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: |