Analysis
-
max time kernel
29s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
28-06-2023 19:41
Static task
static1
Behavioral task
behavioral1
Sample
ho.gif
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
ho.gif
Resource
win10v2004-20230621-en
General
-
Target
ho.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1292 1620 chrome.exe 28 PID 1620 wrote to memory of 1292 1620 chrome.exe 28 PID 1620 wrote to memory of 1292 1620 chrome.exe 28 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 1392 1620 chrome.exe 30 PID 1620 wrote to memory of 2028 1620 chrome.exe 31 PID 1620 wrote to memory of 2028 1620 chrome.exe 31 PID 1620 wrote to memory of 2028 1620 chrome.exe 31 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32 PID 1620 wrote to memory of 1088 1620 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ho.gif1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73e9758,0x7fef73e9768,0x7fef73e97782⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1192,i,14594954421966961597,4408547134749688580,131072 /prefetch:22⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1192,i,14594954421966961597,4408547134749688580,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1192,i,14594954421966961597,4408547134749688580,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2156 --field-trial-handle=1192,i,14594954421966961597,4408547134749688580,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2212 --field-trial-handle=1192,i,14594954421966961597,4408547134749688580,131072 /prefetch:12⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1192,i,14594954421966961597,4408547134749688580,131072 /prefetch:22⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\796a0b55-f185-4921-8f02-b07cd9b8d70d.tmp
Filesize4KB
MD5cc27d389d2ef511f14293af5c9b9681c
SHA16f6f3042f7a500e0405c48d37fc2cf09b8ec379b
SHA2564aa748f9315402c2f74f5ba4d045378ac24853c234b502c4b35d61ffba2bd1a2
SHA5129efac4cb1c8ee3e3844b2a75606eb5daedf93363060153c48eadf02a3561ce0b00c2402f36b18904a0db6f6b317bf9e5dc6bd7e57787481774bff0ad8d2b8df3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD594d1fe32de61c94dd397b2c2321e379a
SHA17b92179919172b703baf721475a3e923be42cf40
SHA256ddfa8e74b59ba8fd993a4d68c5378eec853c9c039f8099277062f90a0921e8e6
SHA5125c7f1f92919cb41ca98dd13d664a56b9c9155ea634d8f7df9ea59b2f2420cccfdc41eb37977cb11671f6a5866ccd0c149fb67818a0cfa14c65c62dc43f3527d3
-
Filesize
4KB
MD55b117b258f6bb3397d3d570c3c8ec32f
SHA1a2cf15e6daa3cbc519971e0394d75a4076693032
SHA2562a6bdc7a6ec6fe76a913880d917f65fba13ec291b95f1d435fb59b4be53030bc
SHA5129013466bde04a7b9ac5b8fecfc4660afc8d7dd9c2b786ed3500d49d407888bbecad0324d9954699fb542fb21c299a766317287b97feffd2d26e1d3746ffab9ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389