Analysis
-
max time kernel
258s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-06-2022 11:22
Static task
static1
Behavioral task
behavioral1
Sample
acf8884a4bfb9ebfe99ed607c4f1cf625cd705ac4317c092ef6dcca3d47027aa.bin.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
acf8884a4bfb9ebfe99ed607c4f1cf625cd705ac4317c092ef6dcca3d47027aa.bin.exe
Resource
win10v2004-20220414-en
General
-
Target
acf8884a4bfb9ebfe99ed607c4f1cf625cd705ac4317c092ef6dcca3d47027aa.bin.exe
-
Size
2.9MB
-
MD5
305de189e8a35d4b98d9d0f45d5a8648
-
SHA1
560cc0d9907c66b94ca007650df910cf505d4a35
-
SHA256
acf8884a4bfb9ebfe99ed607c4f1cf625cd705ac4317c092ef6dcca3d47027aa
-
SHA512
1c74928531d46b29160667e7192b0ee5acc6ad98268855ad371f8b7da1801225dd59c368a97a3b56b5be57809fec661862d0f31b70e6ac3c0cbfd9f2972ec9e3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2976 WINWORD.EXE 2976 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 3120 chrome.exe 3120 chrome.exe 4240 chrome.exe 4240 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 4996 3120 chrome.exe 86 PID 3120 wrote to memory of 4996 3120 chrome.exe 86 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1064 3120 chrome.exe 92 PID 3120 wrote to memory of 1856 3120 chrome.exe 93 PID 3120 wrote to memory of 1856 3120 chrome.exe 93 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94 PID 3120 wrote to memory of 1200 3120 chrome.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf8884a4bfb9ebfe99ed607c4f1cf625cd705ac4317c092ef6dcca3d47027aa.bin.exe"C:\Users\Admin\AppData\Local\Temp\acf8884a4bfb9ebfe99ed607c4f1cf625cd705ac4317c092ef6dcca3d47027aa.bin.exe"1⤵PID:2400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafc274f50,0x7ffafc274f60,0x7ffafc274f702⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1588 /prefetch:22⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4120 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6293939629365830455,9785301514116303197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:3540
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff75c5ba890,0x7ff75c5ba8a0,0x7ff75c5ba8b03⤵PID:4236
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ClearConvertFrom.odt"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2976