Analysis
-
max time kernel
548s -
max time network
599s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
16/06/2023, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
Copi9a8de3la3JU4_Mis0ma_JXOAHUOPBYGDAFSljljq.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~JPCMDAATPY.dll
Resource
win7-20230220-es
General
-
Target
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~JPCMDAATPY.dll
-
Size
12KB
-
MD5
20993d0e3f4ce09f39cd119624f3541d
-
SHA1
e1ad60184a03f48217ab48742b1e2e141272d829
-
SHA256
be9f858306daf9c886fbe579db2f788a21a5531c7d0028b6d663fac43ffaeb0c
-
SHA512
1997c07f0cec3df29a849c1a950ffe80b9c3259d73a43b8a90cc99341fbdfb123f7d6825a5ed1020607261aa5ddd8c089ec3a2ba4bed8c4904fb8e95d445dd33
-
SSDEEP
192:PZWVghWcRIYiYF8r7S4maIYiYF8r7SvOjuFW:RW2hWoIYiE4maIYiE22W
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 632 chrome.exe 632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeShutdownPrivilege 632 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1740 632 chrome.exe 30 PID 632 wrote to memory of 1740 632 chrome.exe 30 PID 632 wrote to memory of 1740 632 chrome.exe 30 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 1100 632 chrome.exe 32 PID 632 wrote to memory of 992 632 chrome.exe 33 PID 632 wrote to memory of 992 632 chrome.exe 33 PID 632 wrote to memory of 992 632 chrome.exe 33 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34 PID 632 wrote to memory of 1692 632 chrome.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~JPCMDAATPY.dll,#11⤵PID:440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fd9758,0x7fef6fd9768,0x7fef6fd97782⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:22⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:82⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1008 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:22⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1292 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3804 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3920 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4156 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2264 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4168 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4196 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4748 --field-trial-handle=1228,i,2905589488619834089,11739418943711799982,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
161KB
MD5295812e17d4a81a322be8c210924459f
SHA17374abf01b33cbe43a0fca62db0fd9173884aac4
SHA256774b6cde773ebbb98f239fd7d14c19210395aa689f13b5b1857e8a813acf7941
SHA5120ffa15cf2e1be1731f17530f6edf25a6377ba9da2ce53e4ba46dd1e165593d6909c845b59d82db6dc01ed9e71fb20b2f505e1d2c30906d4decf9ca1fb960de85
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF754146.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1014B
MD5b7c4f5e653cc436c69f1006f277b473a
SHA130964d9b6f7c1ee1bd1194e48e782162767f4728
SHA256d978b5b1f17c213b16946c65cfa5443a81ff6bc9ff7cc11cc487a2de14c68d2c
SHA512975768dc7b34b8e6ce3aacc2e7510bdb4c5ec264d6d96c0be367b5539991b649b99e488388f0b22e57d045c586a7e4614ad3bf41e86238f37863e6a328f2717e
-
Filesize
361B
MD59f15805e3aa552331e734813346bc598
SHA1496a2fe4ccd1c80e2db9b041768b09c4f8270e08
SHA256e3a8a9c3190bc12f9e27158b7e60646d9ac1f4c3a4d0f60cbb52056ec887a251
SHA512394740bc05a3b7315a7c476792371f4aef426879ba5bf89a323acf54cc02976aac14bc15bb5203c49b92c049274532aaf2e6c127f43210161188ac50a4c08829
-
Filesize
4KB
MD51c0cfea96aef6f8fd5bef0b37dae8736
SHA172e5a5286ae58582591e60347a0d4d553d9ae7c9
SHA256bc0e810f87cd76d19b15083e0015d8fba62ffcf537a1cff19090db21cfc584aa
SHA512c01360e6fbfb2c3a5043320ba48e61dc8a1550398303f3957f43dca2aa02e86a8df02dec2d265276b0a03e02d8d2a5adfa742bc0fe4039fee0adba20d3b2da8e
-
Filesize
4KB
MD54ba834fa9315c357cc9a54af281509f5
SHA12e26a9d410efbca5df317da4de5e524dd12600c4
SHA2569c57c761c03250220c6680f5341e5d06c941cd11e8f8764006396fd9c66b7f97
SHA512d4a5c4ebd59f6555f853e493d4b3d285526a6a0c8ab14e7ca5ce69e3c6b340bbb9d6ebaa9699aeb5f4465e4f400dfcc6d80f2d8d7fa6b7981deac4424fe64444
-
Filesize
5KB
MD5169668ccd4a63af6d4e97a59a6823b61
SHA190f183f3430cef250ba2cb2533986b27a357b7f3
SHA256d7065d4a1fbbb99f9ac0218e9f76284c1c959a0532db6a18abed40f738d7b9d7
SHA512f03d2d9058c0e5043cb808e6579e9047120fe712a9faa5c9924b3734721c94b9a4cab5a3c8797866fc93026266c47eaebeffefb7ded02fa059e84287a6c273f5
-
Filesize
4KB
MD5ed1f8c36b6d14d547e5dd4b51d6b5f0e
SHA13bb4dfa67722f8c7298b75f7281b817d9b135708
SHA256a3d9eb600b43438f3493c3c5d6e98e3958e485009ac2779d4e38ccad4814ed6c
SHA512dd1944ba904eac40e9917c60fa23abb0cb45b69e1feb68fbf69092b1ec3bd744da7342b8e8a5ad105c4579d8cef3096f755c379efa3b23c8c655250b478ae5e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
161KB
MD55ea68b930a946f3d54e3a6ecbe0bafc8
SHA169de452b5dda3ab4ae7a7605710fe4b17a333516
SHA256a8b88d8b90b2acb6890275800f48022198911ccef21713727bb0a83fec5826b5
SHA512d0cc65b01e0512dc9d5121c8c6b09aece06610427232d3a983006f66026d6ec706d8566868f30563103157cd4cd6381ba2caf37756b76685fca68eb36248b3ee
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27