Analysis
-
max time kernel
1778s -
max time network
1807s -
platform
windows7_x64 -
resource
win7-de-20211014 -
submitted
29-10-2021 20:51
Static task
static1
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
chrome.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
chrome.exe
Resource
win11
Behavioral task
behavioral5
Sample
chrome.exe
Resource
win10-ja-20210920
Behavioral task
behavioral6
Sample
chrome.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
chrome.exe
Resource
win10-de-20210920
General
-
Target
chrome.exe
-
Size
712.9MB
-
MD5
551ea245f2fd84442ba030dfdd736504
-
SHA1
4fa2298fd34c148594e725dc4dfd8d008257b283
-
SHA256
feae9fee56e3e88af695d437dd817395e9b1eb8c5fba0d287ce88cb96597d67a
-
SHA512
4b27d81d5258fb595693d7238c3e42acb759bb944db555a4c8a4d772134104a1666f83f7a9943decb7de4359774ea83f27f7b460e8b9ceabdad8b2f71ec1902b
Malware Config
Signatures
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\_MEI10922\python39.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI10922\python39.dll upx -
Loads dropped DLL 1 IoCs
Processes:
chrome.exepid process 1836 chrome.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
chrome.exetaskeng.exedescription pid process target process PID 1092 wrote to memory of 1836 1092 chrome.exe chrome.exe PID 1092 wrote to memory of 1836 1092 chrome.exe chrome.exe PID 1092 wrote to memory of 1836 1092 chrome.exe chrome.exe PID 1104 wrote to memory of 1772 1104 taskeng.exe default-browser-agent.exe PID 1104 wrote to memory of 1772 1104 taskeng.exe default-browser-agent.exe PID 1104 wrote to memory of 1772 1104 taskeng.exe default-browser-agent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"2⤵
- Loads dropped DLL
-
C:\Windows\system32\taskeng.exetaskeng.exe {5DB2C658-5CCD-41C3-9F24-A98C9BABCE6A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {4F814CD7-29AC-42E8-BAE6-6EA10745EDB3} S-1-5-21-2955169046-2371869340-1800780948-1000:UKNHJUQT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI10922\python39.dllMD5
06839776cb721955965a1d5b51c3dea4
SHA1ec878c311d241cd550bcdb26937f65b8cfaebf2f
SHA256f5a9c00b23eb7d67ca7f356ca8c26556b767afe890710fe0fe8b837d4d00bf38
SHA51218c72aa11b3a1d74a0c187d4c3cf538e8689cc5347aca601e49352507b96df36770fae238163fc82d095d160083ae15216b22f7b1e82a1f7d816aaf76fb7db46
-
\Users\Admin\AppData\Local\Temp\_MEI10922\python39.dllMD5
06839776cb721955965a1d5b51c3dea4
SHA1ec878c311d241cd550bcdb26937f65b8cfaebf2f
SHA256f5a9c00b23eb7d67ca7f356ca8c26556b767afe890710fe0fe8b837d4d00bf38
SHA51218c72aa11b3a1d74a0c187d4c3cf538e8689cc5347aca601e49352507b96df36770fae238163fc82d095d160083ae15216b22f7b1e82a1f7d816aaf76fb7db46
-
memory/1092-54-0x000007FEFB971000-0x000007FEFB973000-memory.dmpFilesize
8KB
-
memory/1772-59-0x0000000000000000-mapping.dmp
-
memory/1836-55-0x0000000000000000-mapping.dmp