Analysis
-
max time kernel
92s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 22:31
Static task
static1
Behavioral task
behavioral1
Sample
scratchblocks.png
Resource
win7-20230220-en
General
-
Target
scratchblocks.png
-
Size
78KB
-
MD5
8ce58dd26b33ca32a1c331d2a6c70ff5
-
SHA1
57a0743c8e7753f32f89208cbfceef809e12445e
-
SHA256
122a8a208755879ff6c33f39e3cc00e236fa92621c595961871b59fc8d192a4c
-
SHA512
c21ddf0d344839a71e5892f9e29fa271f010bf5eb4cb8ded1991c45e8d1f66b9bfb0822a0540ca2739cc4777718ba200a99aab554880f5ed5d9ba5dbd9bd1b14
-
SSDEEP
1536:UwNXg9u363WFV9HZbjSINhZYzoQFNfBQF5C5W2:UwNYu3FTtjSAuzjFlBQmg2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 33 1280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1280 AUDIODG.EXE Token: 33 1280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1280 AUDIODG.EXE Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1988 rundll32.exe 1988 rundll32.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 340 1696 chrome.exe 34 PID 1696 wrote to memory of 340 1696 chrome.exe 34 PID 1696 wrote to memory of 340 1696 chrome.exe 34 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1872 1696 chrome.exe 36 PID 1696 wrote to memory of 1952 1696 chrome.exe 37 PID 1696 wrote to memory of 1952 1696 chrome.exe 37 PID 1696 wrote to memory of 1952 1696 chrome.exe 37 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38 PID 1696 wrote to memory of 1244 1696 chrome.exe 38
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\scratchblocks.png1⤵
- Suspicious use of FindShellTrayWindow
PID:1988
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1692
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1864
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4841⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5eb9758,0x7fef5eb9768,0x7fef5eb97782⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:22⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:82⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2248 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1416 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:22⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3604 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3856 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3968 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4120 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:12⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4428 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2620 --field-trial-handle=1196,i,9789229565078731455,11183971829816647559,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RF6dd8a4.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
363B
MD5b83a4139adfd2204fd9e8016e236a28f
SHA168395f7d37b8ae5da91a5aa46d88f7e292d6960b
SHA256e8dd2884b3949215ac98403ee39bddb4d77c476f5eccbbfea4bd8bfcb5e0390f
SHA512eb646a0e16bb5b1949006e4a80af87443cf7b411c13c6595c1cf72084eeb5fbc49834f73e7db61579fc5665abb75aae14afe2e9d3fa6a2ae7db1c1db16b26992
-
Filesize
1018B
MD53c4ee7630f33749b72717e5b2b760f28
SHA1113f0dc7a2b10fbf63882cd948cd276c00ad3a1a
SHA25608b0404edf91b8e7266fb6be0a210698be808564d10e4aa9faa891c450ac3c16
SHA51266dc32fbd9b0bec5ea7786d52e0c705334e30d948915edb6545bbfee63df38d88dfb35d6ae17714deb34ee1c9e2e30a891bcf8345f43fc399510275103d0e044
-
Filesize
4KB
MD5e977b9edb8c09ad5e9c13e9771ada420
SHA1d32f07114ef821009071fa0f7f0c947ec5a88564
SHA2563b70dfd61181025f0e61649ca2d4f353e51df706dfa22015f372e152df474cfd
SHA5129872091fa575c6b2c26002c03025aa43170ac7816cab8dc477162e01ee31d980c3c2917a90e13ee699530bd76cb09e1718876d545ecf62672080ee31b922bd09
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize129B
MD5076ba4687dbe4aa9b896a4e2756a372b
SHA1f9750429e871e33ba0c98d2a20978e802999a9e2
SHA256ded4068862629da60ba80266eae6113a271f597997de6ba118478649bcc1947c
SHA5121ca76e7252d1eec0a32304d2bd0185446b18b5a40d36f470c6e8802e2b0c8a3e1d87cc519a7a81a0213f6bd917b3b01de12dee0c9902129f9c92d3075e3c1b4b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
173KB
MD59722e392bd8924972004524a34233efa
SHA1987a63babe919f93b759148cc0fc8a9c911c6766
SHA25654a23a96a6a91153a96dba78ea6b489b839ed9fd50045472a11b19719b04b703
SHA51228ea849be3143157bf82602fa69e0c8014c236634a54c425e28ff5253bd62be25b10935442d390948f63b9ed38cf9d038b31cf355acbd5c2680cb3bd6388b931
-
Filesize
173KB
MD5129212de6d5fa3c173709bd0728368a3
SHA1f4b15b1024ac577fe02db3cbcba240d172400ba9
SHA2568e0db6a5ff4092d8dcaf9d38d0e6995567ddb44cdcd61ca850590623bd411058
SHA512bafd4a1fb75706cd8da6cd74b8b8b999731df416104257035263a3eb413304212932e8f3066e6bb6b3853917391034f3c9e56ef1262583f2e31a93739c9a3a24