Analysis
-
max time kernel
77s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/04/2023, 00:17
Behavioral task
behavioral1
Sample
Updater.exe
Resource
win7-20230220-en
General
-
Target
Updater.exe
-
Size
86.9MB
-
MD5
ce8bfa9506b346a73ac1fadb93aca749
-
SHA1
18b46eb6c8adda08651ce89c25f08672a4913fe8
-
SHA256
c9914b29fec5bf4dc97fe5b0b31ae0d3e38215d2d6238611e1ed283588372880
-
SHA512
8b69326f377101d8ee200a70078f589a885851bf6eb5998ca6985025fcb7eb7abf05ebf25243b896c494ac0ece0b9a0a6196a67bcf677c96fa65a732c4c5a341
-
SSDEEP
786432:BYYr5DiQzejrlBQqRLehJKqCk4ufQcEdKDjpCwyoh:Brr5Rzs3Ra3CkW9gjpCU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: 33 1172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1172 AUDIODG.EXE Token: 33 1172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1172 AUDIODG.EXE Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1904 1048 chrome.exe 32 PID 1048 wrote to memory of 1904 1048 chrome.exe 32 PID 1048 wrote to memory of 1904 1048 chrome.exe 32 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1924 1048 chrome.exe 34 PID 1048 wrote to memory of 1376 1048 chrome.exe 35 PID 1048 wrote to memory of 1376 1048 chrome.exe 35 PID 1048 wrote to memory of 1376 1048 chrome.exe 35 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36 PID 1048 wrote to memory of 1572 1048 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe"1⤵PID:1980
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1788
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5e09758,0x7fef5e09768,0x7fef5e097782⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:82⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:12⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:12⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1260 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:22⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1336 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3560 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3912 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4180 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4216 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3772 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2604 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4452 --field-trial-handle=1220,i,14013244749285362169,9566021718453856148,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1528
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe" -Embedding1⤵PID:2772
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1952
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:1532
-
C:\Windows\system32\winver.exewinver2⤵PID:2892
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:3000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD512d06f706a3be02a77e58d796d7d318a
SHA1a6c03ce89cc01c18cf47d3a12785dd26cd031359
SHA25663c7d481d67b86b6a649c4a2d23241a22142fb05eda57ca4ca8aea7a382eb71f
SHA5123a7a631783a98cf04347d88de41840926ce7c4391badbec512c4fed0c4a8d078757964e282e490391dfd4288f60f6974504d45f0d6ce1e92ac782c3754017ef8
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD541a694cd9aa43cb826ad3503b66e401f
SHA1a9702dc34e980847e9f2a0b0e54892b0ff70c3b3
SHA256cf2591d239749f695bf902016b390d5f0902e92926d67c02cd0382ac5ec00b25
SHA512719c29283dd15cbf91a1525384e1b7c4e8dc6fa3d61f172fc7fd0698ce192fbeaebd3726fe18623e8f85088410823c164dd63f6c428981832929efd5e5118642
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d698b7b5-6dd6-4283-88b0-9a31a93b4e05.tmp
Filesize4KB
MD5f211aa9c3c3c9cf9ae4286b213883fb6
SHA164d928a7a7e6d1a4705d966cb62e9601afb595b7
SHA256e8561ebf76e8c0cf9470e71942b10ac4b421a617bcee03a60790f9801e21667a
SHA51273a40e34cb1df3a03ed11c72e7aac50033d4a26b0069ee0b9a4aa8f058a9feb9f8b80606bbee271d5818329609d1bc6f0147cc4cd84bffc12473139f803342c1
-
Filesize
200KB
MD5ecaf558fa78462c0b831c6141e30455b
SHA1eb205a3c77d36ad1fc6fbbb08b55d2e08c3a4df4
SHA256b266d3b9518ebbe43fc9fa80cf16fa511b2a8a19d4d435e86f2ad1a526561c3b
SHA51259ee7c7684d2311f4a3b883e9f7d91aed0523eec67cd2667b72b1c0f74a31c0ad9bdb1fa73eb604c80897e44849a230cf48f3f3818cbaaee9050840647696a07