Analysis
-
max time kernel
34s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 23:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Lethal_Company.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Lethal_Company.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
Lethal_Company.exe
-
Size
651KB
-
MD5
a5721809407229d21ea49a2eb5d8e962
-
SHA1
1456ec35a2d975ec9d5e732c1fb27987c4184697
-
SHA256
469f208de455fcb6d334b6ec3655102ae6893de374f890961ab9f317bdfb2c8c
-
SHA512
f2d5dfb53b790f65987cba5340a3983f03eb23416dc8eb1a1d768a109d845191c48a445f54783b16ed4e089086d2f2815f91582a0f2a547d959a74c5a2f4064a
-
SSDEEP
12288:p/744aOD8q/jZe+uMPnH8ENDk1sqhtNswxLwNfZI9MFwKF9qlfLCkG:x9aOSMPnH8ENDk1sqhtNswxLwNfZI9MD
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2776 wrote to memory of 996 2776 chrome.exe 93 PID 2776 wrote to memory of 996 2776 chrome.exe 93 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102 PID 2776 wrote to memory of 2100 2776 chrome.exe 102
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa9f3e9758,0x7ffa9f3e9768,0x7ffa9f3e97782⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:12⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4212 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4780 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4072 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5048 --field-trial-handle=1928,i,10148135620864106537,10337253130784345297,131072 /prefetch:22⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\Lethal_Company.exe"C:\Users\Admin\AppData\Local\Temp\Lethal_Company.exe"1⤵PID:4640
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5108