Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2023 04:34
Static task
static1
Behavioral task
behavioral1
Sample
open.gif
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
open.gif
Resource
win10v2004-20230703-en
General
-
Target
open.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133352517213232696" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe 2548 chrome.exe 2548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe Token: SeShutdownPrivilege 4288 chrome.exe Token: SeCreatePagefilePrivilege 4288 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4564 4288 chrome.exe 22 PID 4288 wrote to memory of 4564 4288 chrome.exe 22 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4764 4288 chrome.exe 87 PID 4288 wrote to memory of 4248 4288 chrome.exe 88 PID 4288 wrote to memory of 4248 4288 chrome.exe 88 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89 PID 4288 wrote to memory of 2316 4288 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\open.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc039e9758,0x7ffc039e9768,0x7ffc039e97782⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:22⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:12⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1864,i,4446894332513776549,18135412490960912487,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\17bcfbdb-8087-4019-9c52-b944b9b58825.tmp
Filesize6KB
MD5a59754baa561639002fe475b75f7a02f
SHA1cc8e8c31a982ca876a1291940b6b2db477d66378
SHA2566010e598ca89dd8b5acb8d5f4c12592861d6b387571619c0d9680e445fb97846
SHA512799866eed9160cb175ea5a4b6511e717cb962638331511c3aa53e0a70e02cc640b20e9786a5f39b5c4b058728c8519be704bcc27aa1e32c29b4d88e7b2ca713d
-
Filesize
1KB
MD53ca1843c9fc23994b881b1733c8ee1f5
SHA108ab8e451f7429d4a723aa9aac9c50c3ecef0a6d
SHA2569386784d0c4ed51dd59adcfb3623dc563e79423a2adf6e0141c652d8a314fef4
SHA5125d39afc523f5cbbe1c3089d9ac7e4c246ef0087b9ab225d21792d177bc1c1aa894e764f7220637f6d517f8e33f2bb99a21cc58b8918580d09a0b3645088e5cfe
-
Filesize
6KB
MD5fb13bb1a885aadfad2ff8beed5ac2ef2
SHA19f0f5c90623d4e3ee227dba12e0ddfd1fc94b283
SHA256e40f0c4dc14172b9af86a69d8a932495d7255281d7c29e6283a641b5c43ed30b
SHA512c7abc54be6c733e135f881b41a8f7098d09c21c527601d5639468fc22d5393d51f3ed0342de82741247bcfe1c668d9df332b4a8b2f6c86574ea5e9049ac2378e
-
Filesize
87KB
MD56dc21ae51036a6e669425b13f2aae676
SHA1dd5cc153a1dc39f953c6b9f5b5e23281eb7a5fb4
SHA2567b178b8de670e39c216bf95b42b6cf79e2f4279f9b05c16f37c3b81b92d548c7
SHA512d0327291d87d1a5b4cc3482d1ba90ab11b809461a596cf0fa70c6ed848f0a2d45ff038222f9a3178bbc4092dfd41b3b2231c9b6bdd230c3b556daa05ac384b5d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd