Analysis
-
max time kernel
31s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
LastActivityView.chm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
LastActivityView.chm
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
LastActivityView.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
LastActivityView.exe
Resource
win10v2004-20231215-en
General
-
Target
LastActivityView.chm
-
Size
19KB
-
MD5
3cfa706aecbfabf73fe8270baa528577
-
SHA1
c70eea1ddfca236d041cf138a3813a04501500d7
-
SHA256
462d2d409228e8d93f3d285472901515728bd843efb0dcbc1e66e6764588a1e0
-
SHA512
3931321b37f3957a2c881cce32f079f3bd7bc7f502e54c39fe7d225ad2b1420ede0f003930e2ef455c0e49fb9de3fb1db0db95e6d7485a36a48927006df1183c
-
SSDEEP
384:0b4M3PJFPc6yLz6G6hZoLUnFKeVRIwT07rg1ygKcU:0b4cP/c6yLz6Gu2UFKeV1T0IMTc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe Token: SeShutdownPrivilege 2780 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1944 hh.exe 1944 hh.exe 1944 hh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2900 2780 chrome.exe 29 PID 2780 wrote to memory of 2900 2780 chrome.exe 29 PID 2780 wrote to memory of 2900 2780 chrome.exe 29 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 1184 2780 chrome.exe 31 PID 2780 wrote to memory of 2140 2780 chrome.exe 33 PID 2780 wrote to memory of 2140 2780 chrome.exe 33 PID 2780 wrote to memory of 2140 2780 chrome.exe 33 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32 PID 2780 wrote to memory of 1252 2780 chrome.exe 32
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\LastActivityView.chm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7179758,0x7fef7179768,0x7fef71797782⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:22⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:82⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1548 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1436 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:22⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1268 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:82⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3740 --field-trial-handle=1412,i,12453334259302982823,7354308111154943273,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD56dbf507cffdd203a2c0ed1950e545e09
SHA1a265be7f7b3218e935d03b91b76476acfa5017f5
SHA256f144b2349aa8ac52a2f8e19b16d638cac098446e8298c67baa38146d2d0fd2a4
SHA512e798ec621fb4c01895b98ccc67b09f733d1351a2ad15510fbefce00546480e9f987f9e3608b0c8416b1ae987acad3918447a937f9f45d300b9a6177cfc84f8a3
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD573d737c2fada65d5da9c29e90d01b86a
SHA1419b4925eaeec041a1e8beadbe4f42c30846f9be
SHA256352f5ec6982862d289b5f3065d2654369bc818c7a9affe5d8606485117a39a8d
SHA51249c6d31b31fabc6cdb1286652cae8ca73b03cf67edda563803f86a2e70f10695f250415db1cfd6eef5ee5ae617d78961501e0762928bc6523ea06f8eb9cd1fe0
-
Filesize
6KB
MD550f22e99a18453012ebce0a78c17048b
SHA10aefb7f713154ce14801ab6bc3239f0c7bd0bf47
SHA256991fed48b4fdcbb92869ad0388dbdd2d4d1ea776ff6ccf325531f15788e33d0c
SHA512f18b61e482775965ce6dc5b89522873235c7952fa03858d2cf95cf5b357fce9d70fcc3dde15908c98b40e7c0f167ee865a7c49e042fdb989e257b6c352c224cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
229KB
MD5d6fcc70414eee6a84322b6cde7344068
SHA10394876d8dd4366f1f3b5b9b3f6220f177ac2885
SHA256b1f66aa303cf4ccbd1af4038a56a8919a78db8a68a162c55ab588dad6a7d4211
SHA512b945e590e711dbe0350aa6e753831e8461653aac3e368f11a03caf1ec9a128725541cb205a63523ac04710ffbb6e1097da461041679a2ec732bc1826f056b09a