Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 10:06

General

  • Target

    ChromeSetup.exe

  • Size

    17.9MB

  • MD5

    d5e9e6554281ea3efa2b1e40aeb9cb8b

  • SHA1

    4152ca6e3146483ab96a8cea6cad1285cd12e80f

  • SHA256

    3cbd732d1d9b72c12fd0b5338f6ea6417ec2d242f258fedab71fe48cdadccc2a

  • SHA512

    5ac8bc3817923304025e4c6f4f8090f1bc1a69cb8a9fc327aac47ecdcc62a4f3cc68ed7d77ac8aba3e1dbb9b83d9bd9d1cb7181e1bc9608486a4274ccd7c69b4

  • SSDEEP

    393216:VexY3xqC4zlB2qIbgpXAKCcOcfUz15rJE:0i8CClB2lUpX1BO8C5rJE

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ChromeSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\ChromeSetup.exe"
    1⤵
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2960-0-0x0000000077B30000-0x0000000077B32000-memory.dmp

    Filesize

    8KB

  • memory/2960-2-0x0000000077B30000-0x0000000077B32000-memory.dmp

    Filesize

    8KB

  • memory/2960-4-0x0000000077B30000-0x0000000077B32000-memory.dmp

    Filesize

    8KB

  • memory/2960-5-0x000000013FF40000-0x0000000141D6E000-memory.dmp

    Filesize

    30.2MB

  • memory/2960-6-0x0000000077B50000-0x0000000077B52000-memory.dmp

    Filesize

    8KB

  • memory/2960-9-0x0000000077980000-0x0000000077B29000-memory.dmp

    Filesize

    1.7MB

  • memory/2960-8-0x0000000077B50000-0x0000000077B52000-memory.dmp

    Filesize

    8KB

  • memory/2960-11-0x0000000077B50000-0x0000000077B52000-memory.dmp

    Filesize

    8KB

  • memory/2960-12-0x0000000077B60000-0x0000000077B62000-memory.dmp

    Filesize

    8KB

  • memory/2960-16-0x0000000077B60000-0x0000000077B62000-memory.dmp

    Filesize

    8KB

  • memory/2960-14-0x0000000077B60000-0x0000000077B62000-memory.dmp

    Filesize

    8KB

  • memory/2960-17-0x0000000077B70000-0x0000000077B72000-memory.dmp

    Filesize

    8KB

  • memory/2960-21-0x0000000077B70000-0x0000000077B72000-memory.dmp

    Filesize

    8KB

  • memory/2960-19-0x0000000077B70000-0x0000000077B72000-memory.dmp

    Filesize

    8KB

  • memory/2960-22-0x0000000077B80000-0x0000000077B82000-memory.dmp

    Filesize

    8KB

  • memory/2960-24-0x0000000077B80000-0x0000000077B82000-memory.dmp

    Filesize

    8KB

  • memory/2960-26-0x0000000077B80000-0x0000000077B82000-memory.dmp

    Filesize

    8KB

  • memory/2960-29-0x000007FEFD960000-0x000007FEFD962000-memory.dmp

    Filesize

    8KB

  • memory/2960-31-0x000007FEFD960000-0x000007FEFD962000-memory.dmp

    Filesize

    8KB

  • memory/2960-36-0x000007FEFDAE0000-0x000007FEFDAE2000-memory.dmp

    Filesize

    8KB

  • memory/2960-34-0x000007FEFDAE0000-0x000007FEFDAE2000-memory.dmp

    Filesize

    8KB

  • memory/2960-37-0x000000013FF40000-0x0000000141D6E000-memory.dmp

    Filesize

    30.2MB

  • memory/2960-55-0x000007FFFFF80000-0x000007FFFFF90000-memory.dmp

    Filesize

    64KB

  • memory/2960-63-0x000000013FF40000-0x0000000141D6E000-memory.dmp

    Filesize

    30.2MB

  • memory/2960-64-0x0000000077980000-0x0000000077B29000-memory.dmp

    Filesize

    1.7MB