Analysis

  • max time kernel
    151s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    08/09/2020, 09:59

General

  • Target

    chrome.bin.exe

  • Size

    61KB

  • MD5

    135ca92c295ddc744ff6fbc10bc07829

  • SHA1

    bfc6502ea3881249e45813f2e5ac484f77e755c0

  • SHA256

    64fc4ddb598c590a3d9a38821b6f6bd64552b1de4a98b7e5b372983128e2b88f

  • SHA512

    966049e688a7f8ca4e14f719043c7e2daa7fc16447a826ba4ce2edace765af61568298a0f85c555f51b7ca0c42df6f548e7688b3519ca5c2872ca70db0fa0e01

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1267 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chrome.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\chrome.bin.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:408
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/408-0-0x0000000073440000-0x0000000073B2E000-memory.dmp

    Filesize

    6.9MB

  • memory/408-1-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/408-3-0x00000000052E0000-0x00000000052E1000-memory.dmp

    Filesize

    4KB

  • memory/408-4-0x0000000005880000-0x0000000005881000-memory.dmp

    Filesize

    4KB

  • memory/408-5-0x0000000005380000-0x0000000005381000-memory.dmp

    Filesize

    4KB

  • memory/408-6-0x0000000005210000-0x0000000005211000-memory.dmp

    Filesize

    4KB

  • memory/408-7-0x0000000005540000-0x0000000005541000-memory.dmp

    Filesize

    4KB

  • memory/408-8-0x0000000005680000-0x0000000005681000-memory.dmp

    Filesize

    4KB

  • memory/408-9-0x0000000005610000-0x0000000005611000-memory.dmp

    Filesize

    4KB