Analysis
-
max time kernel
931s -
max time network
1699s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
pmerj.txt
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
pmerj.txt
Resource
win10v2004-20231023-en
General
-
Target
pmerj.txt
-
Size
78B
-
MD5
b5791083ae1d70510ecca6e007ea4dfa
-
SHA1
7e46c87eb83fd1a838640f7699d9982b23011b73
-
SHA256
31382f19b867a8a7204fcaa3c5525658b93555558c7cf710067ccee159c2a42e
-
SHA512
fc5770abc57e85bcb2be86a07ff4b011fedc914b139d14f3b914899abac0199485f6a7e3ee5efd08226e1f24984b209ed8acebabe30ea18a95e6c9a47841003e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2096 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2096 NOTEPAD.EXE 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2204 2268 chrome.exe 29 PID 2268 wrote to memory of 2204 2268 chrome.exe 29 PID 2268 wrote to memory of 2204 2268 chrome.exe 29 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2624 2268 chrome.exe 31 PID 2268 wrote to memory of 2576 2268 chrome.exe 33 PID 2268 wrote to memory of 2576 2268 chrome.exe 33 PID 2268 wrote to memory of 2576 2268 chrome.exe 33 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32 PID 2268 wrote to memory of 2596 2268 chrome.exe 32
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\pmerj.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:2096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6569758,0x7fef6569768,0x7fef65697782⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:22⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:22⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2248 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 --field-trial-handle=1396,i,14886244326731202241,14869899024525850261,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5531b9f22afdea948b73b69d555f3c227
SHA14cead42b8392a8df241e96ca317fc1d85578c393
SHA25655f9466545edb7fecd5120e07fcd8812034616f93a64993fe6aea65f5ccc89cd
SHA5121f2f756dacb27e5fe6fd084e0778a1715ca911d435bdfc18057a8982c47d6ef1701733cc22a6284a244fbef0a6c070f0495af3abcf744963a2cc9790e9578a14
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD595e71626b7d19019ae722b96c8caab53
SHA17fca9b1dd0e0877cb09ede6b5892264c776ae862
SHA256cfb19fb1d5b62bb6c29dd5b1fc7f8b08a8ca6898b62c563c3451ebda98dc30c4
SHA512ffb30264771ee2a716ebf41623f556db9e78018bf1fa77269b2ad7d3aae9095575af79f1481616cbb50ee42893a325399ddbec1101863860a4ca238048e3e0b2
-
Filesize
4KB
MD545b65df4cf74939913b8a79c84277be4
SHA10b1b17941988c383045c4ac1706189e684e1607c
SHA256517d22bc795fd8ea1e93d8d16041c4112d38aa74b2fa183f7943bcf14d0ba185
SHA512a46b19618e3ca3b2e605b80ecb89459d3d32beef9ea3f7ca405286fd5d2df576130c908bdb65d180db431d8877dc6b2d11cd860b25316275f5e9d58235d0e270
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
110KB
MD5269885400f7e7a01b12b628738e7fe5e
SHA1b79bb96066d345c149cf3bc879354b97254a567d
SHA2569eb80b93b07a75d4607e8ebfc1fa8b4da395f31e90da567550b1a43ce9585995
SHA5125b247192009176eb6c35327f2f93e4406d7625c838a9c62ca631ca37b4040ecc1809d75922e8d64931c461cf25b72fa203276b2e8f907cb49dc7742d7dcaca7b
-
Filesize
236KB
MD5c6c2e76c47ae331c5c8412190344f6bb
SHA1d0f92237d4502ea53062b9aa8da2c4a05488149c
SHA25628068be898e40436f20452cbeaeefb14e984b01ecea76a84d41d57b12d0616ef
SHA512a8eb4d6d40b47ae41640f57a8d977b71bdabd9328cdfcd022b4ee541fd13d2b9a17cb2314bf9abd5d2c4f063610ffbe6ec3ea10f13a9b86d117774a533d4a68a