Analysis
-
max time kernel
23s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14-07-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
eicar.com.txt
Resource
win7-20230712-en
General
-
Target
eicar.com.txt
-
Size
68B
-
MD5
44d88612fea8a8f36de82e1278abb02f
-
SHA1
3395856ce81f2b7382dee72602f798b642f14140
-
SHA256
275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
-
SHA512
cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2500 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1648 chrome.exe 1648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1648 chrome.exe Token: SeShutdownPrivilege 1648 chrome.exe Token: SeShutdownPrivilege 1648 chrome.exe Token: SeShutdownPrivilege 1648 chrome.exe Token: SeShutdownPrivilege 1648 chrome.exe Token: SeShutdownPrivilege 1648 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe 1648 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2108 1648 chrome.exe 29 PID 1648 wrote to memory of 2108 1648 chrome.exe 29 PID 1648 wrote to memory of 2108 1648 chrome.exe 29 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2732 1648 chrome.exe 31 PID 1648 wrote to memory of 2884 1648 chrome.exe 32 PID 1648 wrote to memory of 2884 1648 chrome.exe 32 PID 1648 wrote to memory of 2884 1648 chrome.exe 32 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33 PID 1648 wrote to memory of 2744 1648 chrome.exe 33
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\eicar.com.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66a9758,0x7fef66a9768,0x7fef66a97782⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:22⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2332 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:12⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1428 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:22⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1392 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3432 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3540 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2820 --field-trial-handle=1296,i,1915537207817185367,17191211185548382938,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD570975ad758bc81dcb7224b5cf11d99f4
SHA1fc7b32df7a18a4308b7f7c67c560823956129d32
SHA256f965a08c8309d305920d115cce959bdb606109038ce9f0fc24615d548321f183
SHA512746e741ee096d042c63e0361e514284c047205284fb17218f7e611d79ef57b3547e5eee226a43746ff570e38fdff5d6f9c8c62a4d56e175c533feb69b6ec0c79
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
525B
MD514d860c9c992d4b8890f8eae548847b1
SHA14bcf70af03c699601fe19963a4e0686612798dce
SHA2564c76cc355a6d5fb3ecba02fe488feb91e3612c809f38742ef3daf759b1589bbc
SHA51245bbe546cfbe22f0d9637dd0bbfdc14b441ad76e894c2cf92646559cc853df60b00b380aa3b1928457535e32d61356cc3edb1d1f23f7bc7f79a3db0a68a463b1
-
Filesize
4KB
MD5f4d55d3fcd49a46f0610707139234c22
SHA1bc7f0e5bcf209240f5206376d24fc4a41ee4756e
SHA25633bb34eb2c0e33c5c1883edce0d9d49fbadc57b96e08491eadddadb435d58f5a
SHA5127f5f33c6ff7334b778cf3341145a28848b8805f359eb738c98146567958fc7238a1a3c1e8764524fe1f39a34c6ed8364fa9d93e596269114e2d1ebd4ad8581a6
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
177KB
MD5830e0acaf4d2b941b0aeb800c02e0bd2
SHA1efd25029a7c9cd231e84e92df7cc9c19ed2ea797
SHA256e76c33db14df444b70adedb40e4abb4c98de5463f1466c455e8321bef191ecbb
SHA512ca151613f6d79c47827afdca3e0de41e6ecb0a2ffe1e23eb685b7ea8e2d51a84dfbca2363f2e58e66d802b4bb1840745040720002810de7592d95da6cb1e6daf