Resubmissions
17/12/2023, 09:23
231217-lcwf3sfee4 124/08/2023, 10:29
230824-mjle5abg93 824/08/2023, 10:11
230824-l8dwxadb9s 724/08/2023, 10:08
230824-l6nnbsbg33 123/08/2023, 12:45
230823-py9sdacc24 823/08/2023, 11:00
230823-m38prsda7y 123/08/2023, 10:49
230823-mw51asbe95 523/08/2023, 10:04
230823-l4fvpsbd49 123/08/2023, 10:04
230823-l39rdscg9s 1Analysis
-
max time kernel
17s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 10:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win7-20230712-en
General
-
Target
https://google.com
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 532 chrome.exe 532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe Token: SeShutdownPrivilege 532 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe 532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 1700 532 chrome.exe 28 PID 532 wrote to memory of 1700 532 chrome.exe 28 PID 532 wrote to memory of 1700 532 chrome.exe 28 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 3020 532 chrome.exe 30 PID 532 wrote to memory of 2244 532 chrome.exe 31 PID 532 wrote to memory of 2244 532 chrome.exe 31 PID 532 wrote to memory of 2244 532 chrome.exe 31 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32 PID 532 wrote to memory of 2708 532 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7389758,0x7fef7389768,0x7fef73897782⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:22⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3184 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1416 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:22⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 --field-trial-handle=1376,i,13807800364463579226,9743426586860245512,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2252
-
C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"1⤵PID:3020
-
C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"1⤵PID:1896
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5ff934f07c90e8a28a8213bdb96e37ded
SHA12a84889778cc4d1f80a47d3ad28cd84d095a917b
SHA2568fb4147495f118adf3f8d7276909ab56c761314957246fcf47fe26b0ae88eb6b
SHA512f4af427f985d9c0411b6719d4fcd50085b9f18aa3a0b2d83af6f3f3f87c6cdda18521f2fcdebf401587d148d158743917bb7969e3582719620769808acf35344
-
Filesize
5KB
MD5ffc618376b1bd2f976d851857aa12990
SHA14e811587934db753aeb41fb25704257f0c4705b9
SHA2565a5d9c291a81c72b2a930d703dcc526d66d67d8c20dd99ac892b7eaf72930a5c
SHA51246481941889bda28f144ee7cca7cc156b86ccbd3ecfe8017a8ee16fca355bc21c2f3220ffe79540da21927c198d3103f3faa7c8f50b08d2e705b43108a590762
-
Filesize
5KB
MD555c4346089d9a114e4c6dc982b7c1eb8
SHA13637d8847037ed866e13c8e37a522e212dd3fc04
SHA2564a8ff3def9bdf477821ce3afa10599d89b23c2660a3a7295fe91b68185b038a8
SHA51203e737d442f0da645be27896e55dff16b44de5c05139223caaf13050ad370d4c275582a40f5b2fb4e20a38d0ceee045c7096b1325b54c425bda035d159669777
-
Filesize
5KB
MD555f5d42dda561e4ee9619b8fb21042f8
SHA1178cc83385a9a413c74a24193388d4dd5c436864
SHA256ffb5ec92272a596126e2c976832443feee9bdd203e01928db86a7fd0a5b71ad2
SHA512d92eb1320d4d41305ff424a1cf8cf2409e23b16d3b079cbcb9611244d05e62aaeea4dc21426e709e033078947978c754491bae06d7891b0312e4398ee87bfb32
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
12KB
MD5ab9c8d94233550dd82c3090c247df0d8
SHA1384cc6b46daf073cc69677052a19bcedff8cb54f
SHA256ef29359acb44029c4eb8fcc788bf40f1c9f4ed3d3d3d5ed380385f035932a50d
SHA512c1ba1407da6521025a10ad5d5a497561284e0a915dd14e2af50aa4c72cf546753b2d53b54a7e7cd0b0213ab127eebdd941abcee7583121d4eb8a2cf6b2464b8c
-
Filesize
8KB
MD5931eca380819be3d823ff45f04681475
SHA11ef271e4e7a77aee95cad050fc34ecf967b8b0d4
SHA256316198b5bce70bda834d4a8c1d63368b6b56269d9e43c838ecc2e6a6f6fcc8ac
SHA512dcccc00f34804855652d9c7a3a7d1b3399583b0bdd8dc9a011cdd2dee7896fb515f2ea56006c478f94002e00a272368c52639126577a3aa1027355d503759a30
-
Filesize
520B
MD598926db843d5ed93f1cc6f0f014fcc5b
SHA1469947281dc44e96f30b49777d9cdbe2998f10dd
SHA2566f526a2e107b6bcb87347d03ea9178178a9a8d6473b8dabd73018b52a725ad6a
SHA5127d8c0ff1f4cac321840b984c7addabf34e6730441bdca294af9cdc0ba5d9f02d3469c2dea208676b4a98569bc04e4659c974fd688a37ec1922a1b56289acb4eb
-
Filesize
12KB
MD553886def9548e96fb9dc87a15c5e62af
SHA1b8964ac39047c55bfaf26211ddd966b14daf8c1c
SHA2560a60cf57dea02850b2cecf2c8a321e5b71cb5115eec6a37cf8624827eeb2ba19
SHA512b05b3992fbd4775cc39148d323d7498d7348be0b48ba6d555b320a508a43d83413bfb9fb19f5360fd7e1c63b3cd2da2bca389c8684b8a12e7806a8132246387d
-
Filesize
12KB
MD553886def9548e96fb9dc87a15c5e62af
SHA1b8964ac39047c55bfaf26211ddd966b14daf8c1c
SHA2560a60cf57dea02850b2cecf2c8a321e5b71cb5115eec6a37cf8624827eeb2ba19
SHA512b05b3992fbd4775cc39148d323d7498d7348be0b48ba6d555b320a508a43d83413bfb9fb19f5360fd7e1c63b3cd2da2bca389c8684b8a12e7806a8132246387d
-
Filesize
94B
MD55fee8c846e9b919705407a20885194ab
SHA1a1aa27e0366ae24c0c5f3a92bb38817615437080
SHA256ea27260dffe170fc8c7987da31e3b5536795a9e30c76a2e6d4047db474a9617d
SHA512e39ea9473731e201caef09ac448cc333ac7377df6deec1781b54e7d51af41a7e5717725db56088cb2adbe0c647eea2bba91e8a95ad77eaa8d6446c7aea890c11