Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    08-09-2020 09:59

General

  • Target

    chrome.bin.exe

  • Size

    61KB

  • MD5

    135ca92c295ddc744ff6fbc10bc07829

  • SHA1

    bfc6502ea3881249e45813f2e5ac484f77e755c0

  • SHA256

    64fc4ddb598c590a3d9a38821b6f6bd64552b1de4a98b7e5b372983128e2b88f

  • SHA512

    966049e688a7f8ca4e14f719043c7e2daa7fc16447a826ba4ce2edace765af61568298a0f85c555f51b7ca0c42df6f548e7688b3519ca5c2872ca70db0fa0e01

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 896 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chrome.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\chrome.bin.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-0-0x00000000746D0000-0x0000000074DBE000-memory.dmp
    Filesize

    6.9MB

  • memory/900-1-0x00000000001B0000-0x00000000001B1000-memory.dmp
    Filesize

    4KB