Resubmissions
02-06-2023 07:11
230602-h1bvssac99 602-06-2023 07:02
230602-ht5jjaag4s 602-06-2023 06:41
230602-hf5mdaaf8w 6Analysis
-
max time kernel
993s -
max time network
1802s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2023 07:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yandex.ru/
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
https://yandex.ru/
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
https://yandex.ru/
Resource
win10v2004-20230220-en
General
-
Target
https://yandex.ru/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe Token: SeShutdownPrivilege 1304 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1344 1304 chrome.exe 28 PID 1304 wrote to memory of 1344 1304 chrome.exe 28 PID 1304 wrote to memory of 1344 1304 chrome.exe 28 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1508 1304 chrome.exe 30 PID 1304 wrote to memory of 1524 1304 chrome.exe 31 PID 1304 wrote to memory of 1524 1304 chrome.exe 31 PID 1304 wrote to memory of 1524 1304 chrome.exe 31 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32 PID 1304 wrote to memory of 1644 1304 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://yandex.ru/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72f9758,0x7fef72f9768,0x7fef72f97782⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=148 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:22⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2120 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:12⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:12⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3660 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:22⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3684 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3980 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=736 --field-trial-handle=1180,i,8128553830457821608,2791137242246503731,131072 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\237e906b-76a0-4978-85d5-a707fbcaadd3.tmp
Filesize4KB
MD5b125e13e5b3f49744ed5764d85aefe82
SHA12d0c6b746a724bf02674dff4e0c3a4836096be12
SHA256e7825d745df3a574b5abb08af70da1f6ce80ed5d00897533dddf5d6caafdc903
SHA51254101ea844e5d0218c9aef3d5587760f48b22facd8d7b388ecbe9a70fe7fc0f374ea0c933858d53885447e86c0ef53b7eacc8b4dfdd684c07de2dbb6c646cfde
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6d74a4.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD56109f2679685c45f5810c5b43901321e
SHA147e2f5152a95e754400412cc2607ea4179dfc9ab
SHA256a228c588bd5655213179b78ef756adebdf41373449ac5c1aa3333670c94f1d80
SHA512c30552c61fa5a7e119bb946b2b7549ca50222c926cc4b39965b9caf1d79239a2292b463e2dded42272c84bc0abf2481a02a488b15bcefc927a09df266abbc714
-
Filesize
4KB
MD53564fe6eaa4bd31a58570fe0b6208aaa
SHA1d621061261059abaea4960525e5130d8edd3fcd4
SHA2566cd49fe781ffe664a5a309802faa19740388978390a49b9326e1a1fa1889ab6d
SHA51278e35dd53c58c5e60a4cdfec02e8b129b298097efa92287afa590893905ac20554e01b73b0f700cb25e065a1c03ba813b883303b340817480585158125240b0b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389