Resubmissions
12-10-2024 18:55
241012-xk1asazfrj 1030-11-2023 19:32
231130-x8zddshb2y 1028-06-2021 11:05
210628-3vdg7sx13e 3Analysis
-
max time kernel
1055s -
max time network
1717s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-11-2023 19:32
General
-
Target
31.214.157.40_#[email protected]
-
Size
7.1MB
-
MD5
bb1570ca408cf76448102c7ecbbe322c
-
SHA1
0445c648174ca1930c2cdb0b89902cd4e984a9ea
-
SHA256
b0baf071692d63267aaf41bd3db933826523b59e8fca49655e1656ce0c656c71
-
SHA512
53efbbd752d2b0dd1e13231bf8d917a5ac512962860f6ac46f76d6fb618b4a83a54cabdee5295b20805bbd6a9ce343ff2967257679419185ede4b4ab45294a3f
-
SSDEEP
196608:qLcWN3KlidmQtekNXjglGHglGKglG05Pu0uCET7+y:MNxJHgKgBgtM1+y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 64 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c0031000000000054587369100041646d696e00380008000400efbe5458a463545873692a000000f6010000000002000000000000000000000000000000410064006d0069006e00000014000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616193" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000005458a463122041707044617461003c0008000400efbe5458a4635458a4632a000000040200000000020000000000000000000000000000004100700070004400610074006100000016000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000005458e06410204c6f63616c00380008000400efbe5458a4635458e0642a000000170200000000020000000000000000000000000000004c006f00630061006c00000014000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000007858763a102054656d700000360008000400efbe5458a4637858763a2a00000018020000000002000000000000000000000000000000540065006d007000000014000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f44471a0359723fa74489c55595fe6b30ee0000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000005458a4631100557365727300600008000400efbeee3a851a5458a4632a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid Process 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid Process 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid Process 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
chrome.exepid Process 868 chrome.exe 868 chrome.exe 868 chrome.exe 868 chrome.exe 868 chrome.exe 868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2604 wrote to memory of 2616 2604 chrome.exe 29 PID 2604 wrote to memory of 2616 2604 chrome.exe 29 PID 2604 wrote to memory of 2616 2604 chrome.exe 29 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2412 2604 chrome.exe 31 PID 2604 wrote to memory of 2448 2604 chrome.exe 32 PID 2604 wrote to memory of 2448 2604 chrome.exe 32 PID 2604 wrote to memory of 2448 2604 chrome.exe 32 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33 PID 2604 wrote to memory of 2292 2604 chrome.exe 33
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#[email protected]1⤵PID:2872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7419758,0x7fef7419768,0x7fef74197782⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:22⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2284 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1408 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:22⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3228 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1032
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fee7688,0x13fee7698,0x13fee76a83⤵PID:2144
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3812 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3704 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1196 --field-trial-handle=1220,i,9238482015381037774,17296890852624268626,131072 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD508bc5d71e7d502e2bcbedd80bd1d73b5
SHA1b0dfb2527097c3a24cebbc8642b4e6ce06311df3
SHA256b9df6d90a1d95c758931df68af4425b7e43233d8980e2d812120237eb85f6fca
SHA51273b49c132ce09f078d527d0be97082a74549b98d7d1010b149c12855bebf510903386a8703520c44956e4e99762f6d36088793e8920b6baec50b03460dc36ef6
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
839B
MD59b85bdcded35ee53fe7eb51a5db11fe1
SHA1f2996bcb39f87fb9550944d1466e212309e54ab9
SHA256aaf73512a966b7918f9a12a213b2ea59e9cbc16c36fcfdee9e4cb02187108952
SHA512bfbc11c322cd515d2464b34b973132bab2d90c9fbdbfb0ddf56918b657563fe93c584be84cf74a9890b73b55cbd5b3ca2cbf45a4b34598421f7f33bfea0837f9
-
Filesize
1KB
MD5b65951e47f2bf42c538bf11c9ca89b2e
SHA1047cea49dc9c9451c9b5891d87ebfa92b526535d
SHA256c5b2f22c904d87adde7640aa9e974526ca575fa169ce22b56082be3bd5c16988
SHA5127a6a4ef313c6099a18526570f106fe123f75ba5e043555fe6adc1c33d432aab16fe6d8f70e3bee91655f766feecc8af86f7468070a86e0ec729efda0fafd042b
-
Filesize
6KB
MD50872ccf5404e49fc292bc3807c07990c
SHA1d9b92ae6b72613d9c8ec940b8e6f7f577efca113
SHA25622f21fb8177d47fd499b163f8ad07ea981a7056ff87ded7afc226b63634bea5f
SHA5125d142ed922ffcd9f6a093dfde4f75bf1ba4e69a11659afd1d2432c9f1e06db980b84733b865e472b027aaa33d4cf7111b9cd15bca582cb960d4fea60222e8fa8
-
Filesize
5KB
MD53f4c9b3a42778a251e710e87428e0371
SHA1e519640972035a4f1ddafd32cb577be4ebea3bab
SHA256bee6f608b27555a5e09614821a172e6b0408562f3e1f63a93b1b5573709b1a23
SHA51282577839e14d6e299315441211345bc5c644988a5eac93a8d303f9800617f3f8ebe7acfa644b3113841488dfbf81219a05fa19400a4170223c05477b2415f097
-
Filesize
5KB
MD5c499d4d856204f09b2c37617facd1d68
SHA12fde2ca5872d5699d1b006d71bfc5a4b62183826
SHA2567d0e02ae8650fe1c2a0c4bb04bfe3db77405c85c3f8755abd7b7413512337b47
SHA512e924259d46264914a250b96def37522aa12d528ea103252e46dbf6cdc64ef45b6eaca70cd325c8594246c83296255aac70201316ad98a5005cf8b3b77a2fb8fd
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
259KB
MD5c23d2bd73cd4a374844faeac912c6a02
SHA1e6bfe13e94815f71c8f01d4f6c0ec05d9dc52daf
SHA256577f1e356755188a92def4874851b72ae0fcb721476a45fc30b059e4193fdf6e
SHA512f0029ebd3c4e5a18a77a4ae48dc6aa588a137c6d213fa506d0c54402f274cbda5e13df33fe42c7556460caac2cde62b0c2795f1cef99d02845c728e6988f21b7
-
Filesize
259KB
MD512dd7f15fd341cfe2d0e333f12a0f5f8
SHA11c5b1784d7a5e3d5704a9fc360584792d6aba6e4
SHA25680fc03f336652d98800af194ff309ee2e20151a2e4f0a1cbb00335bf5a51cef8
SHA5122ad464b001c7f343f82d3c488abde43b029d7ca952a58e87409fe4935f3cd172c921d821d7b423b0cc1565fdb4bcf4a48bcf1f6fa04cb28441f7b64490a6d4fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e