Analysis
-
max time kernel
41s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 16:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://correctionoppression.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://correctionoppression.com
Resource
win10v2004-20231222-en
General
-
Target
http://correctionoppression.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2664 2340 chrome.exe 28 PID 2340 wrote to memory of 2664 2340 chrome.exe 28 PID 2340 wrote to memory of 2664 2340 chrome.exe 28 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2668 2340 chrome.exe 30 PID 2340 wrote to memory of 2552 2340 chrome.exe 31 PID 2340 wrote to memory of 2552 2340 chrome.exe 31 PID 2340 wrote to memory of 2552 2340 chrome.exe 31 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32 PID 2340 wrote to memory of 2568 2340 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://correctionoppression.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6729758,0x7fef6729768,0x7fef67297782⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:22⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1256 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:22⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1420 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3884 --field-trial-handle=1240,i,326969222597359692,1328325421867196892,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5d7afbdedef9a9373294f523ad433c25e
SHA198159d563333a1bd420c24e3e50d30884b7b7235
SHA25679672bb685678c274d00ccfbd931c1b0073ebdfc37adcb072115d89af018dab9
SHA51261e559c81b76c01cfb79b7905f12896939d2128e539c775f860da04f5fe62035b92e36246d6daea20287ea945f7d0556c0618bbf5f67b1eeaaaf3618bb945c8e
-
Filesize
5KB
MD56718a3998ad73bcd1678af2b27db58a5
SHA10c2e9fc4d693d58912c65f4a24b9bad763754b25
SHA256132dce12285e5e133a18a05be53aea1227da8230265f4b9ef0634d332a53d558
SHA512b9779f7607f691c54e38cd0d28ddf045aef0b3dbc12a8012f56bbaac9837ce0a24595db9c2c02a6e8bbc734a7465cecc2610299e99b9f39ee3029786f6c3e7b0
-
Filesize
5KB
MD53ae4f13a1e41c231d2d611ab33d2a16c
SHA1a533ef53ed2b6517a591a9bb4315312b5276ecdb
SHA256e939948baa1ee175d1e700fbb2e3d2287c5cc425a2510d9767489a4eeef18f10
SHA512b33e71646d567fb59b83962c3677d22f887b353d36367da877747f75689f08764893d8c8dce6a3d0d2219e297edc610d6a3beff23d7dca3eb2adae18aa522e06
-
Filesize
5KB
MD5ec819defdcf9d5aaebd94bacfdca6900
SHA12a3f8fa2718a2205cc15c7979e8a1e0b7ff68122
SHA25652240d03e9960a800dff1bdaf017c06b44f1c65f29504167d5e3464e85ac25fb
SHA512574e240f83ddd02b68255cd1eb55a34d78673b4cb5a15d4059265b9c17e764ab5229d27cb4a605efdd711cfaa477d7768210231abdad6a9157c0d5069e2738c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2