Resubmissions
18-09-2023 14:35
230918-ryfkmshh5w 518-09-2023 13:32
230918-qs772abh65 1018-09-2023 13:30
230918-qsalrsbh58 118-09-2023 12:41
230918-pw13fsbf72 6Analysis
-
max time kernel
639s -
max time network
1726s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18-09-2023 13:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.google.com
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
http://www.google.com
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
http://www.google.com
Resource
macos-20230831-en
General
-
Target
http://www.google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2324 wrote to memory of 2296 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2296 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2296 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2964 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2252 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2252 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2252 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe PID 2324 wrote to memory of 2468 2324 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b99758,0x7fef6b99768,0x7fef6b997782⤵PID:2296
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:22⤵PID:2964
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1552 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:82⤵PID:2468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:82⤵PID:2252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1508 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:12⤵PID:632
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:12⤵PID:3060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3176 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:12⤵PID:2552
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1144 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:22⤵PID:2280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 --field-trial-handle=1228,i,18333680453041270850,6858580191668067728,131072 /prefetch:82⤵PID:1508
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5878954eb77fc3f5b2f3a91963e77ac62
SHA16b241826a762ac6490422b2c0243ac5889149b14
SHA256a14bb98bd682ecf7b6914d7b2c41ee938bbec2f8039b57d75869b267919e6726
SHA512b7b0b1c2ea0c3386b3e38b55f7d3aaf347199b92b6552881f3d4bcfdd047d65d62bf5fbaa862d57f32c68384c3def2b5e8d40bb9c9417583e90ac95687f7663f
-
Filesize
2KB
MD5a30a1517e019c7dad0340429d1489a96
SHA113107ea9f3ebeec84023f8ed6c5aa8d5449214e6
SHA2560e742f3cf0087f10b76f53eced1e7a5df6ecf0c097cc4172af6f3df780e1ea2d
SHA512bc8c717c75dc747be718862c47f84ea1699a3688e54edb845661a732f64afe0aab5056352794fe69b8d8e55000e6b709f3927679ae41b063736d8fbca55a6483
-
Filesize
2KB
MD5218076a2d1d5f3f2c0774f12eb2a6257
SHA1784227e1a329de5b22b9db4e979567cdb45771b4
SHA256460ba44facb9a399046dc8c63b2ed79cdf00f3eeb5e40b2ca1d6a0af4b613b83
SHA512d7b366d5f934660b3cc094e0740887b952cdf8f020221334856b19b89e71a0210e9d6d9c88e7cf96af4b1ce369823c9031f7eb6a9c97786b8febd40fe90f2183
-
Filesize
2KB
MD53bbcb05ce98f6cd95d474cb0dc7b3620
SHA15136837151660041a9be1d0d12d807f7a6fce8b5
SHA2563534dbe25ee4b4532990aa7ceebb157f18bfc1a5f425fc60a30483b00177d6b1
SHA512376d4fd222031df329647c0bc1e23629ced5c7f74403bf72efd1537d69f8f85913bc7cc10aa2d01f12be5eb095ec5ffdf84412a981c5d6dbf3c40da0f0a0c6f8
-
Filesize
5KB
MD576534b6efa74b8f49e8feacc2e08418d
SHA1d1a0b6bb845872fed3a724a7a774de35aab1c165
SHA25620adfbdcf989340663a619ab60c63461590e5c19eb21f0732dbbc54d36cba860
SHA512e7e6b71ee6b2f72b0fa898704d0f9dc7f1ac8863e7482c42ce5c5a946a63ce322cbe30097005667163201a4af7681acb21b95bbf806aa00144046e6b0e923cdd
-
Filesize
5KB
MD595ed9e98aba980fc9c6d80faa787799c
SHA1f367bffedba3c5271c5eb9c5dd9e46543e575d68
SHA25654ef176970872915ce71663caab568668a00df49b9549c132cac5073117d59bf
SHA512ca2fd7135d38095982c0e21c62f250d7b43bd637068735a3fc61350cc42b034fb5ffb1f72c52e7e5e8325975dcfc47d05293e78a92acd045c4ffc22b5adb24dd
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e