Analysis
-
max time kernel
210s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
Exploit.v.1.3.1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Exploit.v.1.3.1.exe
Resource
win10v2004-20230220-en
General
-
Target
Exploit.v.1.3.1.exe
-
Size
11.3MB
-
MD5
c2b847517de04602830dfb2efe16410c
-
SHA1
2b3e151e2a636cf4c390eccd42cddc36fffb737b
-
SHA256
2a831cb5d80e8ad44291551e52970c8ceec4a9cb1a90c85d5b1938cb51635926
-
SHA512
c7246d1d43073a238dc50e956b0239159741ac014ee4382512b711aaac40c92873e2532ef96ed8adfb6e6dcb07c09ca5b367af4fa28a6b9ea987239daa3fd9f4
-
SSDEEP
196608:oJQ57GdhPfko4wvg/Ov6axqWfMqP7JyRVXl2/l7uhCeMjQI4mF8y7Q4IWk9qnxFQ:oJGSLPfko4uHfMqP7JyRVXlbPv74V7KH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2044 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2044 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe 2044 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2044 vlc.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 940 wrote to memory of 1932 940 chrome.exe 29 PID 940 wrote to memory of 1932 940 chrome.exe 29 PID 940 wrote to memory of 1932 940 chrome.exe 29 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 620 940 chrome.exe 31 PID 940 wrote to memory of 1656 940 chrome.exe 32 PID 940 wrote to memory of 1656 940 chrome.exe 32 PID 940 wrote to memory of 1656 940 chrome.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Exploit.v.1.3.1.exe"C:\Users\Admin\AppData\Local\Temp\Exploit.v.1.3.1.exe"1⤵PID:1236
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SearchApprove.3gpp"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6899758,0x7fef6899768,0x7fef68997782⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1248,i,5373187469546019754,14088745317094546265,131072 /prefetch:22⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1248,i,5373187469546019754,14088745317094546265,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1668 --field-trial-handle=1248,i,5373187469546019754,14088745317094546265,131072 /prefetch:82⤵PID:920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5478a4a09f4f74e97335cd4d5e9da7ab5
SHA13c4f1dc52a293f079095d0b0370428ec8e8f9315
SHA256884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974
SHA512e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1