Analysis
-
max time kernel
82s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-01-2023 14:19
Behavioral task
behavioral1
Sample
f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe
Resource
win10v2004-20221111-en
General
-
Target
f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe
-
Size
2.9MB
-
MD5
df0b88dafe7a65295f99e69a67db9e1b
-
SHA1
db3163a09eb33ff4370ad162a05f4b2584a20456
-
SHA256
f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429
-
SHA512
2206969d222882dd8b7e3e5671311462266277d699e08e3016a7b3781b17390e8dd11956d8aaecae996a2c16227d7b2390eb84b9b8df26e39ffe8f38d5b76fbd
-
SSDEEP
49152:cDVwASOLGtlqrRIU6i9+vazNqQlJZP1BMU2thA8mNtNCiJlrRUFcJ7HIPcLzkw5c:wm+GaNqqJJ12vlZol8cJ7rc3
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2012 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
chrome.exechrome.exepid process 1108 chrome.exe 360 chrome.exe 360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 948 vssvc.exe Token: SeRestorePrivilege 948 vssvc.exe Token: SeAuditPrivilege 948 vssvc.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe 360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exechrome.exedescription pid process target process PID 1680 wrote to memory of 2012 1680 f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe vssadmin.exe PID 1680 wrote to memory of 2012 1680 f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe vssadmin.exe PID 1680 wrote to memory of 2012 1680 f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe vssadmin.exe PID 360 wrote to memory of 1872 360 chrome.exe chrome.exe PID 360 wrote to memory of 1872 360 chrome.exe chrome.exe PID 360 wrote to memory of 1872 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1128 360 chrome.exe chrome.exe PID 360 wrote to memory of 1108 360 chrome.exe chrome.exe PID 360 wrote to memory of 1108 360 chrome.exe chrome.exe PID 360 wrote to memory of 1108 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe PID 360 wrote to memory of 928 360 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe"C:\Users\Admin\AppData\Local\Temp\f484f919ba6e36ff33e4fb391b8859a94d89c172a465964f99d6113b55ced429.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\vssadmin.exedelete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2012
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6614f50,0x7fef6614f60,0x7fef6614f702⤵PID:1872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1136 /prefetch:22⤵PID:1128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1836 /prefetch:82⤵PID:928
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵PID:992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:1964
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3216 /prefetch:22⤵PID:904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,4026860597668135069,17420302570475615061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3744 /prefetch:82⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e