Analysis
-
max time kernel
474s -
max time network
2717s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
attachment (4).gif
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
attachment (4).gif
Resource
win10v2004-20231020-en
General
-
Target
attachment (4).gif
-
Size
143KB
-
MD5
0b036b66e3dd4667f0f29045c00e84bf
-
SHA1
38b9c036d91deb00950b2c89a5d0b26ba9237566
-
SHA256
cb5f6303efec262346ba6826eba8ed35ab86242bfbe1172949cb843eaf2466bd
-
SHA512
51e1a4e89922ccdc42578eab3bcf608b08740bcb93353f74d36858262460d513c9a5d14c0bb044974be74b8659cbbc2a4fc75b7876900055d790473a47aef8c7
-
SSDEEP
3072:rgUWzRuxWb4XXaSyOTTV8AeOzhpDhfe0nsQMDpkdyERpdyu6r6zYl:rgUdn6SyOTTV8Ae2DhW0nsQMVHeT6eY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe Token: SeShutdownPrivilege 2716 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe 2716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2696 2716 chrome.exe 29 PID 2716 wrote to memory of 2696 2716 chrome.exe 29 PID 2716 wrote to memory of 2696 2716 chrome.exe 29 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 2568 2716 chrome.exe 31 PID 2716 wrote to memory of 3048 2716 chrome.exe 32 PID 2716 wrote to memory of 3048 2716 chrome.exe 32 PID 2716 wrote to memory of 3048 2716 chrome.exe 32 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33 PID 2716 wrote to memory of 2272 2716 chrome.exe 33
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\attachment (4).gif1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7269758,0x7fef7269768,0x7fef72697782⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:22⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1260 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:22⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2904 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:12⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3516 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3744 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4048 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1392,i,12811455568938423338,8161478278202809024,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD511124ec50487b161d77578f020854c71
SHA1d42174c74d8f835e5707147949fbd67c27574491
SHA2566ece54c4277c759800c74ec468a16a3f25dd0c522a1008725db29562bb48548f
SHA51261ea5d7a1936e9f11f9e7560b54d325d73da248f1eccb284080b227c0f8722aa22b50891cffb3451432e2b50a08cd43172f2ed33d3e2e422d7006dd208dfc52b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b11c6067-9f0f-4dc5-8f6d-e5f0701ba198.tmp
Filesize4KB
MD5beac64d4fb136f097c07a7b96b6df596
SHA176cfb74ab23058fe09a8281294aca2bfaa17182d
SHA25618973d00e5f7faf6c3d75c946224fffc7d3dc3bdb5456d123381ff2022eff342
SHA512b837aaee458160b9cf877acbf5f384d183630c56cede9d6629510d697a0c9b2b3667c7c0d14baaa4ae0361838ff1b02104af95eb7fdf68bdee664e4fd9abce31
-
Filesize
109KB
MD5682fb0e76b0c2ac7083a0399fc9d3e43
SHA16624302dc271b1b63c63baa6e64473cc678d0fd9
SHA256edc7b5fe930c07377224ed8e65964e5b70d2487fba4532bd2816cca71699f4ee
SHA512d2086ea96c4d79e21efab14efdfb0dbe0b6c6556e25f96c8afeb4b8a9c8fbadeb9dc8da0c72bbb61996207115417680f0788eb736079f7ace5ed65a0498dc12b