Analysis
-
max time kernel
41s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 16:20
Static task
static1
Behavioral task
behavioral1
Sample
Leadership Academy_pdf.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Leadership Academy_pdf.html
Resource
win10v2004-20230915-en
General
-
Target
Leadership Academy_pdf.html
-
Size
465B
-
MD5
30fba55cfb13e0cf269661bf5736e250
-
SHA1
3e5afec84d9a7973d81fba43c9392a8d866384e9
-
SHA256
a4e816cf0f61c0ef3bf5402391faf09312f1ed0cee17fc85e7a05c2bc00094aa
-
SHA512
be521709ab2999c889e0c9122e9da1a991093a37c601f73c36773096e7c204d94baf027a060f75268ae2c2c306ba669239b63208dc319f87aad34d1ad0fe4fb5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2860 2420 chrome.exe 27 PID 2420 wrote to memory of 2860 2420 chrome.exe 27 PID 2420 wrote to memory of 2860 2420 chrome.exe 27 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 2808 2420 chrome.exe 29 PID 2420 wrote to memory of 1400 2420 chrome.exe 30 PID 2420 wrote to memory of 1400 2420 chrome.exe 30 PID 2420 wrote to memory of 1400 2420 chrome.exe 30 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31 PID 2420 wrote to memory of 2444 2420 chrome.exe 31
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Leadership Academy_pdf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d09758,0x7fef6d09768,0x7fef6d097782⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:22⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1512 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2224 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2768 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:22⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1412 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2608 --field-trial-handle=1372,i,1857101860833849710,7775904875569370729,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD58263d98b6d695ee3cf8828ffb910d4f7
SHA1c208e5a5c7b2d5b623d64050939ddc937bb305ea
SHA25648508c9702b66f8f281f42596ff3f39b26ae404fb230afd147ca98436b0148c6
SHA512a6a89856c038aa619dcfabb4a6ccfe97af79101e9f5249716c3efaa7a614290f81170a3a15e8ff8ed76317206bc96911d01fad7e92c27827248792f7a05a5f8e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_myskillpath.my.salesforce.com_0.indexeddb.leveldb\CURRENT~RFf77c062.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
689B
MD5f3bd87c9c7ff6dde5bd61531bce6e7cf
SHA111c921c4ef3118587d101f6d61b3209a30a531af
SHA256d148a50d21c0227bd743e4d82ed1eca9a02d5f75b6087111a15ba347db48b6bf
SHA5120ad5fb7d9ca72afa98b8b9cee79bb02703304e40ba336e9d9d49c8ae34dd56c33621f5261fe5c541f11b7a4d528b540d92690c9de46882155001f645e0bd5739
-
Filesize
526B
MD56b912f6b66b089d8a1119b72bdef7047
SHA179acfd2e1abe3d023ac600a77c5f092922a4a815
SHA256588d0a430745833a63b95fb211c7de0af04c2512e1fa6169198605b13f282c45
SHA5123d639e3a8f9c0320bb427e92dc84fa83f7d9b28f15edeaea1ac02bc04d04e2f6935337c49d160c250bcdcd045c19e03e3da50973afea912deb7c1eb156c6bd30
-
Filesize
689B
MD512efba9430f4a02d1837f43c28a9f3b4
SHA12b2564fe944d89a44f0e2276b2e3b56e958d6912
SHA2568e36f66c250df123b083bc388a86a7600f35b2cb2e14f3e03cec317d2e341c9a
SHA51282076a8ceb0e8d330affa8a12da20cba57bd577f35c204ff0f773a2a554cddfebe0d141639fa76f185a71c2b28696f4b80920251fec6afbcf3cbd0796fb46f17
-
Filesize
689B
MD514c5d0ef82e1f68f0072941eb04a458d
SHA195d69b625b15d548f308cbc41d580a2f7999c97d
SHA2561fc5e04696b3f88b5d3866638ab514a650f01b18d1634ac01d5659faf76913a6
SHA51254cfea5426d15da190840d03a121502d1abb2e85c64eebfaf27f161c3111c96fcc3962ff4aee931742bce97813df030fcf74e6608516a0eae09dad21e446a515
-
Filesize
689B
MD5ea662bd624d30cb56ec3e923871215da
SHA13beb7e622420e377f1f400fd6edd153dec797fe4
SHA256fe48bf6b601cb86b47a8dfb29b6f554a2180e96a3f5839d7e48cf11658f7e720
SHA512c905fb6dc8bd2196e1f24c2183deccd8330a55a05cc5a729a6800faf57a69decc1bfe43b1a03e8640149f221e06d290436aea4853a221c4e780be7b9db239b6c
-
Filesize
526B
MD55bcc14ad0e1ac8a129b8d82a5cf6ac33
SHA1e1a04e86a0d238d091ebb37ccd3661fa430906bc
SHA25684f79185b3aee5eb50f2cf5a8de66e3f6ce08168ee8e30db10f7822bd96e361b
SHA5121f6163636d58286d34264427ad31df56f76f07ee1520d767f190228d4f6e6cd154be27caa5e7e3b96bc5278e63f223fcb55aa324875a47b757b075b6f77cb923
-
Filesize
4KB
MD5078185c9db0b38ff12491d66c039e01c
SHA122a37bfb5e5610088503bb25bd9882bbb0321de2
SHA25657daa03f712c587d912d612654f0506d7be45a665867f7670dbcf19190593963
SHA5121af0d692561951834d88fe06ea804f22d5f35689bf1d0e5d1f45e6869bf6f7610b659def27272882887cda83c3e857c3ddcb6f525e00e728cb93e600581d15f7
-
Filesize
4KB
MD571bfab168f7daf923eeacdd9d73b00c5
SHA15868b245728b09bbd0307460a5383c2915dda885
SHA256ed5a537fe195b7a0eca9c56114348a9403b28c9f47a9f9553e23f02b721c0fa8
SHA512f9cb35f15322b4bfe06103277aa2ca9657bcf1fe728e759dd004adb80888e98f985bc3228b6df996ad4fa46bfc46c28d7e94ae55240464fb067722066eb09088
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ce5cf1c4-a315-4d17-98f4-43867ad731dd.tmp
Filesize4KB
MD59b9cf3a3ff802cea0ef2faf9f62ffc5e
SHA10e50b0a36755c0745e658cc055761cf049bf246e
SHA25685fc3cc90692d76d20ba6d66b093e9dd21128dcb089fe194f1809f79c6895ba9
SHA512c8af457a0d2482921c5469b5355e794eef42c755e075d63effcc6a56ab23e67d20c0c6b4586a0eb9c4b32afdef4f515896cc2dc1e4b528ad705775a1972bf810