Analysis
-
max time kernel
32s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe
Resource
win10v2004-20230220-en
General
-
Target
686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe
-
Size
3.3MB
-
MD5
38b258c567b378058ac5cad63ab59584
-
SHA1
4ff45b549c8f26558a23adddb599bf6293926301
-
SHA256
686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771
-
SHA512
318ce130603db3ba327a1c1082bc23639082aac1b32d09d08fdea5507ef24a179822e9f0500328131dd44191b5ea59c079b386ce0f6c56399a714028ac87644e
-
SSDEEP
98304:jgYLkFZCB1bZZ68WY2V0FR0NupgokfAGzeV77+tl:jgYLkFZCB1bZZ68WY2Vz8ppkfhzet+r
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1328 chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1448 686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe Token: SeShutdownPrivilege 1328 chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1448 686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe 1328 chrome.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1448 686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2044 1328 chrome.exe 28 PID 1328 wrote to memory of 2044 1328 chrome.exe 28 PID 1328 wrote to memory of 2044 1328 chrome.exe 28 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1344 1328 chrome.exe 30 PID 1328 wrote to memory of 1760 1328 chrome.exe 31 PID 1328 wrote to memory of 1760 1328 chrome.exe 31 PID 1328 wrote to memory of 1760 1328 chrome.exe 31 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32 PID 1328 wrote to memory of 1068 1328 chrome.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe"C:\Users\Admin\AppData\Local\Temp\686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --noerrdialogs --disable-backgrounding-occluded-windows --disable-background-timer-throttling --disable-background-networking --disable-extensions-http-throttling --disable-renderer-backgrounding --disable-audio-output --disable-breakpad --disable-sync --silent-launch --restore-last-session --ran-launcher --profile-directory="Default"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6729758,0x7fef6729768,0x7fef67297782⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-breakpad --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1200 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:22⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=1500 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=1620 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-extensions-http-throttling --disable-background-timer-throttling --disable-breakpad --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2400 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-extensions-http-throttling --first-renderer-process --disable-background-timer-throttling --disable-breakpad --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2392 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-breakpad --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1336 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:22⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-extensions-http-throttling --disable-background-timer-throttling --disable-breakpad --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3492 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=3924 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:82⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=4040 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=4064 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=4120 --field-trial-handle=1248,i,13631788614614509953,17004897060065297258,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5b0ae01a4e1007991f1ad3438b9f6ba84
SHA1c3a59d84180ed162e7002eccf2ff7bb406d2796e
SHA25667c3214c5397ee3193cbebdf7c4454e0811a8546ba36ee064332a74e94bb40e3
SHA512829446d9c86d5fe55f48d0db1a336375a1fc489781a887ac973e020cf78c0d17211ffe96e1d9c902bd925ad95375f602cbeac94d75cc4689ca7a6949c5427999
-
Filesize
40B
MD5e31708ebf27b89b8a94c8dfe1623598a
SHA11380f0383f082b2f93ad75894eef7f906595b15b
SHA256183cac5f739516aa889417d5bcff93820294f0ea4eeb1c053db8f1abad9a9398
SHA512ff544b4aff1e168392327810a0f9b4f769011e4ac90dd36f760c6056a085917117036e49925751e4145f39a852076355ad27eaad2303d6b9fa9d48300e12d9be
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5deaba748bb7173845bd514dfbd2059cb
SHA1524309dedb4c9e4a17733b217c4ad7a4203701b7
SHA256668f11ef9d91912e712e86276bb5783edd227a6b3da7bcac6236e710eefc7994
SHA5123266be1917991ac6eb3032990f399b95e18411c847476316bd7c3a34eb2ee14a2356662801ff22148a72f0a00195ceef5a8689b0c0cd7736a205693e7b745472
-
Filesize
4KB
MD57e0da90fc54bdfca92b466968788d239
SHA139e05623b710b55274897279c9edf35846a19bf4
SHA256cc703d9bbb46d407b732e0c2e9ca5ae3d026803d78f055c74578ea61eeb6c6bf
SHA51249b9ece816577f224fbc53e37a1e06a59c7fcbf88891f94bb947cf0523dc55506ba49bbd15ba4abfa74884b03ab25637fe730f0112fca94f23ae1bb03fdba106
-
Filesize
4KB
MD5df8e0de66f6cb317c84a62b09237bae1
SHA1f02576bc0fb8f0980a2129bf590129cee46c7d01
SHA256f3eed35b2ba2804debb66c9f2fd4b87db31996487c510d75ab792e2e063481e3
SHA51204e2f079c2bf64716c3e1d990547c88b221d8c5ceafca4e10d75d5fc27840c46afcacce88c0ad456be628e4f0340ed58116ffaaa9fe2de9cfcf51094dd068674
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
71KB
MD50d5844396dc5b4521519dfd1c79cd5d5
SHA1e03e7b35dd4af410024a4e63fa2494d02c000b5b
SHA25638269b7322462c587fdb6b035e2279b388cb9c0a5c85adbedc86f617ca5c7915
SHA512acd459970c21c229c396dba1906c8286477b7354c351927f0e24e8bf9331aadd1301b95fcfe1f146e6ab86239e22bb338a03d6bdb13f1357021e68f6e60b445f
-
Filesize
207KB
MD5e69fc41ec787b0eab6982792170c32b8
SHA16d427cc02b03e47d891f75e7ce80c1a364c4402c
SHA25689ba90b3ab2b9031e1afd099db5e8506bcf13d7ab6740366246b06aa1bf2fa7b
SHA51205c62b58ad7de172803e3fc881af5ba76ebe75ae03e9bdcb76d20094652775c6fbf9ec1fd5a726ec9c73c815d23adacee096965202ae72680b471fcb87e4cd2e