Analysis
-
max time kernel
20s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 04:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.facebook.co
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.facebook.co
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
http://www.facebook.co
Resource
macos-20231201-en
General
-
Target
http://www.facebook.co
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe Token: SeShutdownPrivilege 2008 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe 2008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2060 2008 chrome.exe 28 PID 2008 wrote to memory of 2060 2008 chrome.exe 28 PID 2008 wrote to memory of 2060 2008 chrome.exe 28 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2384 2008 chrome.exe 30 PID 2008 wrote to memory of 2876 2008 chrome.exe 31 PID 2008 wrote to memory of 2876 2008 chrome.exe 31 PID 2008 wrote to memory of 2876 2008 chrome.exe 31 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32 PID 2008 wrote to memory of 2692 2008 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.facebook.co1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6da9758,0x7fef6da9768,0x7fef6da97782⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:22⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1420 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:22⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3264 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2760 --field-trial-handle=1224,i,8030042515675229849,10115441156176119757,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5a31c704c3cc0fb0eecccb5045a3d29c5
SHA12aa9cc9506b13584740b7dec8af0484481634d69
SHA2566e604e3632832c72c55f150fadce4d4fb645da2343be22663ac7ed4478485e4a
SHA51261d58ab6a56b194dfe1ba3c6ca41d0c237c44f600be126ea7848ce8c577e8724f0f3577f638ae049740bf77fb7ce3a110dae45d8606627609ab39d3704cb164b
-
Filesize
682B
MD5780ced25edef570d6af63560340550e2
SHA1cff636ddd2a93af93268f4b635bcdd2b5f10c9f3
SHA256793441a26bb0c07a2242588bff3dc8a8f752f4d22e430c18f79cb2f36de554e2
SHA5120b7754f3c98172b6522e31775898ab156a4bfe33dbb889d7b5976950f8049e701d5d6721dba8f81095c65862e3766530e8fdf85cd340d8b1aaea1166d80ae94b
-
Filesize
682B
MD580a8bcdf99bb3f4254c9dae29537f593
SHA1742a40c959701d937317182b585c85526dc38682
SHA25672204d6c6f6c3700767e6d78186dfe7f3d8c2afecf84818befebc79d43c7a108
SHA51253314d79de07e0120bb1a9d6c11ca2432fe63e58d4a4fd247f39b1366386463cca3a1bdf280bcf27b6dd5e2ee40803f07e314c67c89081817fc448514dcb47e8
-
Filesize
682B
MD5a7bb427971bb57a3c719fa4911a57122
SHA14cdda1a29b21dbe921a754be6ab9db6006644bc6
SHA256b4fc33e51941033e2212dafe1fe0dfd25aace0703f5ff6afc518d728e12f33f1
SHA5126bd94cd72e592e6bb99583c6932531efd8ad42ec82bfd7e77614bee7b573d50a71bc37970f05646623af9e41525ca49b11f3d055a6454b835d2d310a30483ab2
-
Filesize
5KB
MD5c19315466f15f9d25fe30a33cd1bf49d
SHA1d87f3c2ff7c5aff224c72cafc9d179c153c4f48d
SHA2569da7646bac42709d19cd82df852f808787d889d7809083f0ac9100e7cae01e9e
SHA5121d11c9aca8bb1c33b6b697d7f798e46715568fe24d02e0cbca9d86c7704bb552e5d31b966cbb23980a8aa3a0e1278e70e04e5ea820a94e794117621303f48046
-
Filesize
5KB
MD5e1c87d0b3548310dcedd40b8181541bd
SHA1a440df0c10d3eec5fd9d67d69fff3e14454263b5
SHA2565e07bd3a77ac0ca5b534da08277dd1df9c7f9e12a6cd61df65e5ac7be3b9c7cc
SHA5129a88ae00c255525acd7d9a33927066c4b4c8dbaccfe8737d81e44b818a84bf525f025fca71e1eebd62c6852455d28b6f48dee7a7e207799366a1864daba5298c
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06