Resubmissions
21-03-2023 20:18
230321-y3le1seh61 1Analysis
-
max time kernel
210s -
max time network
186s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2023 20:18
Static task
static1
Behavioral task
behavioral1
Sample
.gif
Resource
win10-20230220-en
General
-
Target
.gif
-
Size
43B
-
MD5
ad4b0f606e0f8465bc4c4c170b37e1a3
-
SHA1
50b30fd5f87c85fe5cba2635cb83316ca71250d7
-
SHA256
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
-
SHA512
ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239035466099156" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2016 2072 chrome.exe 66 PID 2072 wrote to memory of 2016 2072 chrome.exe 66 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 5080 2072 chrome.exe 69 PID 2072 wrote to memory of 3544 2072 chrome.exe 68 PID 2072 wrote to memory of 3544 2072 chrome.exe 68 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70 PID 2072 wrote to memory of 4144 2072 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaa4529758,0x7ffaa4529768,0x7ffaa45297782⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:22⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2032 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:82⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:12⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:82⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4396 --field-trial-handle=1676,i,5407351436119103223,14784955183410248063,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5193b1a1cf055b4917c3280e4267f5afc
SHA13e271aa829541618bd7f7c92242b9e4d6c3c31da
SHA25606c2df673473a39aa328e645e2b33a44e8ff9f32da9afb07fe98f02cd73c1ced
SHA5128073e5fc6651ec1eda337c4ea892673989e9549ecc6f5555081de05f5a83515d35d7ebc79a2c7044791674b996111e432757fe02b5efdc1b158cf96dc8708186
-
Filesize
5KB
MD5f3649a371a12dd35b2943eb9f1c206d8
SHA1d5df328c941686b76a309ed55cf04368e5941199
SHA2566eaf232bc54417515a2114c38ea9d04c322e13ec529a7c7ac29f96a063e87100
SHA512479bab644144e5a84c3c79cb0ae17b93b8c94689e6d4f838c93b607b810c792753d3e0814b55f7d1dbd2c2b191f4685a7cfbb489996674ceacbc2c53336c77bb
-
Filesize
5KB
MD50d3f8123167598395052af17ddb66d59
SHA171b0a2c133dcb5a268cce91e0e3a589ba4c9db0e
SHA256eca6af1c81ca1b4925b346847f76ee0dd03a195b8862a185bdfaf3b9b14ce417
SHA5121e6fc0542d3335554373615aa44687d24ce94da231f9d44d122efdb2ed07300895e4bcaeda3a22ee6239d733f6f8b8fbddac7b12bce6f498b31a9e7eb9ad0d1f
-
Filesize
144KB
MD5cc9da88b19dd5cec4ba54de05c3952ff
SHA19582074cd38f7995915e62c81b0bb3779f669092
SHA25659259b7a60f3e842c42f7839c94222b3a64f98f5321846fdd518c07aa8b1aa3b
SHA51219aa384199423cbd41f359a132542451eece27933d4bd74c7be16438fee387a27f199e492d9aedf7fd14864187c8308bb5f6dddf52768349a1da2d93fd8c3fac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd