Overview
overview
10Static
static
1Victoria537.zip
windows7-x64
Victoria537.zip
windows10-2004-x64
1Victoria53...mo.rtf
windows7-x64
4Victoria53...mo.rtf
windows10-2004-x64
1Victoria53...lp.rtf
windows7-x64
4Victoria53...lp.rtf
windows10-2004-x64
1Victoria53...ew.rtf
windows7-x64
4Victoria53...ew.rtf
windows10-2004-x64
1Victoria53...mo.rtf
windows7-x64
4Victoria53...mo.rtf
windows10-2004-x64
1Victoria53...lp.rtf
windows7-x64
4Victoria53...lp.rtf
windows10-2004-x64
1Victoria53...ew.rtf
windows7-x64
4Victoria53...ew.rtf
windows10-2004-x64
10Victoria53...mo.rtf
windows7-x64
4Victoria53...mo.rtf
windows10-2004-x64
1Victoria53...lp.rtf
windows7-x64
4Victoria53...lp.rtf
windows10-2004-x64
1Victoria53...ew.rtf
windows7-x64
4Victoria53...ew.rtf
windows10-2004-x64
1Victoria53...sh.lng
windows7-x64
3Victoria53...sh.lng
windows10-2004-x64
3Victoria53...ol.lng
windows7-x64
3Victoria53...ol.lng
windows10-2004-x64
3Victoria53...ne.lng
windows7-x64
3Victoria53...ne.lng
windows10-2004-x64
3Victoria53...й.lng
windows7-x64
3Victoria53...й.lng
windows10-2004-x64
3Victoria53...st.rtf
windows7-x64
4Victoria53...st.rtf
windows10-2004-x64
1Victoria53...ia.exe
windows7-x64
6Victoria53...ia.exe
windows10-2004-x64
6Analysis
-
max time kernel
66s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
27-03-2023 16:15
Static task
static1
Behavioral task
behavioral1
Sample
Victoria537.zip
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Victoria537.zip
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
Victoria537/Help/English/dcomemo.rtf
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
Victoria537/Help/English/dcomemo.rtf
Resource
win10v2004-20230221-es
Behavioral task
behavioral5
Sample
Victoria537/Help/English/vichlp.rtf
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
Victoria537/Help/English/vichlp.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral7
Sample
Victoria537/Help/English/whatsnew.rtf
Resource
win7-20230220-es
Behavioral task
behavioral8
Sample
Victoria537/Help/English/whatsnew.rtf
Resource
win10v2004-20230221-es
Behavioral task
behavioral9
Sample
Victoria537/Help/Ukraine/dcomemo.rtf
Resource
win7-20230220-es
Behavioral task
behavioral10
Sample
Victoria537/Help/Ukraine/dcomemo.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral11
Sample
Victoria537/Help/Ukraine/vichlp.rtf
Resource
win7-20230220-es
Behavioral task
behavioral12
Sample
Victoria537/Help/Ukraine/vichlp.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral13
Sample
Victoria537/Help/Ukraine/whatsnew.rtf
Resource
win7-20230220-es
Behavioral task
behavioral14
Sample
Victoria537/Help/Ukraine/whatsnew.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral15
Sample
Victoria537/Help/Русский/dcomemo.rtf
Resource
win7-20230220-es
Behavioral task
behavioral16
Sample
Victoria537/Help/Русский/dcomemo.rtf
Resource
win10v2004-20230221-es
Behavioral task
behavioral17
Sample
Victoria537/Help/Русский/vichlp.rtf
Resource
win7-20230220-es
Behavioral task
behavioral18
Sample
Victoria537/Help/Русский/vichlp.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral19
Sample
Victoria537/Help/Русский/whatsnew.rtf
Resource
win7-20230220-es
Behavioral task
behavioral20
Sample
Victoria537/Help/Русский/whatsnew.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral21
Sample
Victoria537/LNG/English.lng
Resource
win7-20230220-es
Behavioral task
behavioral22
Sample
Victoria537/LNG/English.lng
Resource
win10v2004-20230220-es
Behavioral task
behavioral23
Sample
Victoria537/LNG/Español.lng
Resource
win7-20230220-es
Behavioral task
behavioral24
Sample
Victoria537/LNG/Español.lng
Resource
win10v2004-20230220-es
Behavioral task
behavioral25
Sample
Victoria537/LNG/Ukraine.lng
Resource
win7-20230220-es
Behavioral task
behavioral26
Sample
Victoria537/LNG/Ukraine.lng
Resource
win10v2004-20230220-es
Behavioral task
behavioral27
Sample
Victoria537/LNG/Русский.lng
Resource
win7-20230220-es
Behavioral task
behavioral28
Sample
Victoria537/LNG/Русский.lng
Resource
win10v2004-20230221-es
Behavioral task
behavioral29
Sample
Victoria537/USB_SupportList.rtf
Resource
win7-20230220-es
Behavioral task
behavioral30
Sample
Victoria537/USB_SupportList.rtf
Resource
win10v2004-20230220-es
Behavioral task
behavioral31
Sample
Victoria537/Victoria.exe
Resource
win7-20230220-es
Behavioral task
behavioral32
Sample
Victoria537/Victoria.exe
Resource
win10v2004-20230220-es
Errors
General
-
Target
Victoria537.zip
-
Size
1MB
-
MD5
6f1223c60caf4053d5c68dcd62302ad8
-
SHA1
b84319fcead5f9226f23a3e5bddb58a261ac7b9c
-
SHA256
a66b7869d59bbf90b5994332bac57bcbc0b377cee9f0c59c078795ea7b4c99d1
-
SHA512
8fe27d9541fd9a746a40c3777ddbd9de10b739b8bc3a21bf9d681fa23a21a3c0621070d040b2fd8246716ba8fae9ab8054acbfab410885e63b564327a4b24221
-
SSDEEP
49152:vOOdFAN5MFWWuHNc4RPdV5JpE6t86mIVB2z:vR36rWuHNc4XV5Jpi/qB2z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 240 chrome.exe 240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
AUDIODG.EXEchrome.exedescription pid process Token: 33 648 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 648 AUDIODG.EXE Token: 33 648 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 648 AUDIODG.EXE Token: SeShutdownPrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 240 wrote to memory of 984 240 chrome.exe chrome.exe PID 240 wrote to memory of 984 240 chrome.exe chrome.exe PID 240 wrote to memory of 984 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 1800 240 chrome.exe chrome.exe PID 240 wrote to memory of 300 240 chrome.exe chrome.exe PID 240 wrote to memory of 300 240 chrome.exe chrome.exe PID 240 wrote to memory of 300 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe PID 240 wrote to memory of 1696 240 chrome.exe chrome.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Victoria537.zip
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc4
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5179758,0x7fef5179768,0x7fef5179778
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:2
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:8
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:8
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:1
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2152 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:1
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1376 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:2
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1148 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:1
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3740 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:8
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3868 --field-trial-handle=1196,i,10957105634309069147,18162521835265754278,131072 /prefetch:8
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x1
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD5fe721fb4cda49997a7e5eb32a0c48ffb
SHA1f32b2e3e1abf36b449fc8dcd2be039648616b326
SHA2563735914f1354643c9256dcab0842305cf419e6c4eb8d27a3e9b80284b966d8d6
SHA51210bdef601d50c325ab3661eba44c27ede5af24d29f3392b730e93b949478df22cae0cf3be1ed83b495b38139d44597f0010565da6cb37dd14b03976f6fd37192
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.dbtmpFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD57b13c8bec3cf0646c3f69775aab5e693
SHA13dbf3f3e7c112d9ee559c4fbd6b6f299fbb0f2ee
SHA25645e847a8f7075daf12f3bcce03c581d5ace916563a581b8a55f822365342fba0
SHA5121fa9cdc198a1f0c43dadde11d77e2df18707be0fe78300223b90596d8e3d96684c331cf1ec24ff21483439cf268bcbcfb35da4d6dc59c53bb52be8d09acfa53c
-
\??\pipe\crashpad_240_EEAABSNTPSQDFKJSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2656-123-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/2916-142-0x0000000002810000-0x0000000002811000-memory.dmpFilesize
4KB