Analysis
-
max time kernel
394s -
max time network
1767s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
25/11/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
mega.txt
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
mega.txt
Resource
win10v2004-20231023-en
General
-
Target
mega.txt
-
Size
73B
-
MD5
a90b15fb440d1a8fbf47775ed5124839
-
SHA1
3a5143426095023501ebc13da680cf453ea21b6e
-
SHA256
a2300c789f080aa75e0f1ae440a0406eae845771895629546157ddc70de5a3ed
-
SHA512
6d49fea7e6890c1c6b16405740d06b51fbea9f70daad44f44c6047538b8a7b5da98ddb6f2b59b359cd626db77d8e6ed20fe7248e2b33ace9051ee25810fca0e5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1724 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2020 2768 chrome.exe 31 PID 2768 wrote to memory of 2020 2768 chrome.exe 31 PID 2768 wrote to memory of 2020 2768 chrome.exe 31 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 2592 2768 chrome.exe 33 PID 2768 wrote to memory of 3004 2768 chrome.exe 35 PID 2768 wrote to memory of 3004 2768 chrome.exe 35 PID 2768 wrote to memory of 3004 2768 chrome.exe 35 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34 PID 2768 wrote to memory of 2344 2768 chrome.exe 34
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\mega.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1724
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7059758,0x7fef7059768,0x7fef70597782⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:22⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2820 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:22⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3252 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3316 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3584 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3704 --field-trial-handle=1216,i,1602270325125083683,15160415132571014150,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD525f764c76f9386ba2b732224a9b3b3a8
SHA1aaf97b4ffec2e0cbf1760c9baf24e06d592bffc4
SHA25612745e845ddd5ccbe6f5db576427b792d0924b2c0bfbbecd4268c85eb5d36614
SHA512dff3093c73a3f895113d92b2cbde42bb93a39aced51e2360e59b004ef6b19ac2ed3d26125a46c78627f98f99813b48d79b0663491bf4ab3a216c357a6dd609af
-
Filesize
866B
MD5cd4a3d27301ed4b9e480aba597f438e0
SHA18f115d2866f7b572c8b5ca0c36a3c25e3c341976
SHA25661c851ce8fa1278503fcceed259503cf054097c2c2722981c13cf5aa00d167f0
SHA5129b4746d1be1e77623528638391d26e3e491e9c25553649f28734c809fe8d3415219f09368a6d4be8e90276979bd6433625430eb6238d0d9dd08b8537743f204e
-
Filesize
4KB
MD5b87cfd18799ae797562775633385db5c
SHA191ff73c232bcebc986549d4d5e4c70eff9975b48
SHA25677649d0923fa88b990172c99974d799154d8c53cf614898645bd485f1fb73908
SHA51213ac32e2ac5f3411e7cd77cfbd386c7e76d1e5ab3d01586313061980d85677c6dd4df22b9035b9f3a7c42ce4de15ca17a13acb9d99d2ac7ac517eb67786bd90f
-
Filesize
4KB
MD563a27a86a80beec85755c26d62451245
SHA158353e11293e74dd960347b4d839f0965c40c434
SHA25676b6e3d3bea1311e10765750c8bb76cfae48f20f0779804d8c194b2cc26e2755
SHA512a11ab8a4c92b0eb1ca9b7980699d0baf0a388222915ee56185b9502456c85ff659ab2758404971907813808de7ea64d1be6cfe8dfb6c93eea066eb13ae9333be
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58