Analysis
-
max time kernel
19s -
max time network
261s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-01-2024 05:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jksdhshdddjfhkdfj.storage.googleapis.com/u#un/15446_md/11/29212/472/159/391177
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://jksdhshdddjfhkdfj.storage.googleapis.com/u#un/15446_md/11/29212/472/159/391177
Resource
win10v2004-20231215-en
General
-
Target
https://jksdhshdddjfhkdfj.storage.googleapis.com/u#un/15446_md/11/29212/472/159/391177
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1516 chrome.exe 1516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe Token: SeShutdownPrivilege 1516 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe 1516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2044 1516 chrome.exe 15 PID 1516 wrote to memory of 2044 1516 chrome.exe 15 PID 1516 wrote to memory of 2044 1516 chrome.exe 15 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2860 1516 chrome.exe 28 PID 1516 wrote to memory of 2660 1516 chrome.exe 23 PID 1516 wrote to memory of 2660 1516 chrome.exe 23 PID 1516 wrote to memory of 2660 1516 chrome.exe 23 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24 PID 1516 wrote to memory of 2696 1516 chrome.exe 24
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef71e9758,0x7fef71e9768,0x7fef71e97781⤵PID:2044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://jksdhshdddjfhkdfj.storage.googleapis.com/u#un/15446_md/11/29212/472/159/3911771⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:12⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:22⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1320 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:22⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3360 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2772 --field-trial-handle=1196,i,13694665052706079578,10044573833582283106,131072 /prefetch:12⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565ea40a4dda6bbbc474f187a776ad696
SHA1044ac70b397b57badc3b007347784c1e76fe0702
SHA25658387954c4a5e98905a168141405920008c4efc0d807470d6e3e4ffe6d01350c
SHA512c123ed8e946e89270b9d0e724362dffb79004ca22207efff747b834168f46fc12f1e0b5b5ada8a6e5e75277ff544b63bbb178154bed00be93a06a5f18d5c7b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d58d30b59ede136c3610d5cf06742c
SHA1b21d011c17e96164453f2e2e290b227297aed836
SHA25631910086151c56fcd6972c62b23b04828d49180300505b0087528bf7aa8be602
SHA51297e903bb544481671f05cb937074080589a09059406916b4ce766c58798a99eeafd78a0e6643caca21c1372e08a06f487f7d0e798851eb48e4a01aece0ce9d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c608758a6750a1b55b188e0474e540c0
SHA1f5a485b5fd159420c233bc16c8e19a7493fce0c1
SHA256215485ba93e704d0c28deb97aff7be2349f4d2512b7d882ac530e3426e3a1142
SHA512f5adb83f70fd3f283bf0b18520a6d2313f2f5f81fd36b4d35835edc5c30136ebba1a97c791622443c2e93c2b5a378a1e1228ca994da5979c8ab16c075192b917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3642295f8d788e272124f06ea61f8a
SHA1e2edc45f4e34243c97d2a1b9c4eec9caa06512d0
SHA256f3e0a7266e7ff7aa438d0b6a332330753dafcff07c592046514921a765642dc6
SHA51240930d46079b9ed43ed60119d8e8a4fb165562794ddbde0dc631a73159940e231157ac330b2fd5686c962d8fc46347a55861816572ebe1cbc31f99634e0ae7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515aa97e94effb60f7e2ef8fa22797fb1
SHA13727abbf1da630297a7bce31268559e86dd0cd1a
SHA256e50a71e37f3404a016b1ee3f513ceba84e9a3331340f9a4a4edbcf8e05db9d9d
SHA512d677bb7a7ee41abc52866ad312c1026e302ed649fcfa900b23d7e8a42265c82263d364620ea96d947ab07825e62aba78db2e55237e9e54f0145f895d58b2dcb9
-
Filesize
92KB
MD58309aed0590e45921cf7096793fb6143
SHA173ad890a75cce3119e743614ec1995018747429d
SHA2563b30d2d75a547adb02f1937344f98631e629a5c94086e28d2bb947c3214294e8
SHA5122d22c65989f002625982e8c3b48c4aa3758f7ced44221f2d4c7d2500585937e1d257db0af5e6bcb4cc7ae369f69a6e5a1c9edb32a4f06e75dd6541fe4aa4f462
-
Filesize
2KB
MD556a8edef48d33ac2a615eee6ff6bcf23
SHA10e7b80f57a796d9d09c0bdf53a7ad3b983a13587
SHA25684eb3953ed9c39e0a81e1d8bf2cdd31703d46deaa5bf03f471a5730e4c1e97a0
SHA51239a571017b330cf46cc724491d2ad6d12459c3c06b9191e7fe4cabe012f92b53ec36cee4d405af022a8ec339717d87bd30dc2902819f51b7b670e7960e7dfc74
-
Filesize
1KB
MD53280ba722f4841caa1dd0abe7259dd5d
SHA10d53d9d2aa8cb06a38b56ee29b1fdd9d4ba94939
SHA256803b48167914827b91724ec7b16243903c6dfc53cd722340f598405569224636
SHA512be0d839abf8064e43b2788e9cc841b5f85dcea844776f7fbce17f4018dbab9e70314fd8d2973c7210c7f168a720aceb3499511cc624208207b5ac62d0c3944bd
-
Filesize
1KB
MD5c424e2828f29efd28deb9fd1936c39cc
SHA18353873dedd60df85ead6087333c49464692f6c3
SHA256507b6e8e6c673a65dd21739748f44a3cf8cdb1e066acdf79dad49f5b15ffc75e
SHA5122f9504ca6a325e3523e838e53f7f96de025d3dcd5b1e46b8818330e9a69dc23382f4511c48fc028db9b159b0df9017294823ed49a5bf4c66ee9166e28619c251
-
Filesize
4KB
MD56bafe379030f4acb7f114238ae8cb468
SHA126295d30b2d15b7b08a6f58cb47b96edae85ad3c
SHA2563c54e05ea0d41b858113f141a1e6007e954faf56ab509b4a16f67ec55ea3a55c
SHA512e8157a135ce8bef8c8de5e3640f4b96a9bb2b1cf3e315df021c8aee0031b0b5fd439b70ebee127bea8156b3ddefae306d416a6b3ede7057e239dcde2a879b63c
-
Filesize
5KB
MD592cd5ab80f9fe4c0320830f7e127742e
SHA151539b56bdc9bb59e9353cb8103413b889e6af1a
SHA256a9c6aa1645b5811a20476107566e10baef700d9b2b490df2df036bb6795f8b2b
SHA5125fb6df851f0a7259499b9069cbd39a3a58f4b13512618a9c93ca9fd5d6c64dff9ef06607902335cbff37b8ff7fa97a35500cbfdb94e77eeee59671ac6407883f
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d