Analysis
-
max time kernel
1603s -
max time network
1611s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 15:35
Static task
static1
Behavioral task
behavioral1
Sample
Fondo 2.png
Resource
win10v2004-20230220-en
windows10-2004-x64
7 signatures
1800 seconds
General
-
Target
Fondo 2.png
-
Size
75KB
-
MD5
d3125f5f5a80a2c36778bf44a1a65c57
-
SHA1
09e1df66f8c4561fec4d22a731cc53ca872e9724
-
SHA256
3f1aa7d967db9b26cd9e69f3e01cc95fa5667a9edf643a57fc771d860162cd74
-
SHA512
1d580049c1385bb17c494fa40a259bd0f0e300efb26c11852916e7fb18ef96d3e9662418b275750b5b2ada5bc4dcc690530c94c7ddab6053a17aff5e423d78e9
-
SSDEEP
1536:rdcFKuACENm1dDEQbcraCVoaA+9izI2VylvfF0/zv:rcACEM3DEQbcrqaAtvyJGv
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2484 chrome.exe 2484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2484 chrome.exe Token: SeCreatePagefilePrivilege 2484 chrome.exe Token: SeShutdownPrivilege 2484 chrome.exe Token: SeCreatePagefilePrivilege 2484 chrome.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe 2484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1376 2484 chrome.exe 108 PID 2484 wrote to memory of 1376 2484 chrome.exe 108 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 852 2484 chrome.exe 110 PID 2484 wrote to memory of 3940 2484 chrome.exe 111 PID 2484 wrote to memory of 3940 2484 chrome.exe 111 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112 PID 2484 wrote to memory of 2508 2484 chrome.exe 112
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Fondo 2.png"1⤵PID:4596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdec579758,0x7ffdec579768,0x7ffdec5797782⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:22⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2288 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3212 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3344 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:12⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4676 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4516 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4960 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4820 --field-trial-handle=1828,i,2820846308203298178,9694456272520996373,131072 /prefetch:82⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2204