Analysis
-
max time kernel
50s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
Resource
win10v2004-20231215-en
General
-
Target
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
-
Size
1.1MB
-
MD5
fc157bf81ab006d1bb0a542aaf499c53
-
SHA1
2b5f22ac2158a90eae8783e05e62171095bbdce7
-
SHA256
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909
-
SHA512
723f661b13ed7cc9444ba0c1038b2db23716bde32ef02f504131a4f11e5a23a9186ec527c0d9291f18194e7193d62687be1f2a5385ffa37d3b1ea95aaac2f8f8
-
SSDEEP
24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aHh2+b+HdiJUt:CTvC/MTQYxsWR7aHh2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 chrome.exe 2616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2616 chrome.exe 2616 chrome.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2616 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2028 wrote to memory of 2616 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2028 wrote to memory of 2616 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2028 wrote to memory of 2616 2028 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2616 wrote to memory of 2428 2616 chrome.exe 29 PID 2616 wrote to memory of 2428 2616 chrome.exe 29 PID 2616 wrote to memory of 2428 2616 chrome.exe 29 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 3028 2616 chrome.exe 31 PID 2616 wrote to memory of 1776 2616 chrome.exe 32 PID 2616 wrote to memory of 1776 2616 chrome.exe 32 PID 2616 wrote to memory of 1776 2616 chrome.exe 32 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33 PID 2616 wrote to memory of 2528 2616 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fd9758,0x7fef6fd9768,0x7fef6fd97783⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:23⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:83⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:83⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1868 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:13⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:13⤵PID:268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2804 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:23⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3236 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:13⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3460 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:83⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3784 --field-trial-handle=1360,i,3428354123431494270,10467875205276940156,131072 /prefetch:83⤵PID:1324
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD55e5639e22ebfec869c91740ea3edbeb0
SHA19e4313b5b0205a8d478a84b415f987cca397069b
SHA2562103e059d5ed4fea7f865bd1ae4b8ca6db0c3e63860a708be151fec8d58fe30a
SHA512e9ac1c1aaf15e7e4c347906f0524e2c073051d99329026f71e2ba2eb7b6959152af58eafd25570eb3912f570b5df761c9c770086679f1f8acd3627d19b2d9f68
-
Filesize
361B
MD52987078190661086270189f7b43da9b2
SHA10dab078d44802edc3af55ae18246a60a3ac73a07
SHA2569ee0427f6a4ec1dc73df77aeb60d1bf312e043d4a7b102cbfa1e6927436d048e
SHA51241ffd9b8b0bd42efa1182d208da672bb6298938de6ebb7d768e6efa7dcd1b404acdc86ab545cc3dc989e4f116e6dde49739e51a58379488a6a5aefb2c47d67f2
-
Filesize
5KB
MD55b3a2ec3643c03029df90467195bdad7
SHA134c3cf05ec315bf9492635bdae642a0abdd29df8
SHA2568d256f83eb341662f7796a477b4d5435cbb0527f7faa802784cfb0b4629cfc5b
SHA512bc68cf21319780223fee0d325845aea36e971a1af550af31e68588f65b75c24bede01f97ee37b3d483d96aa1bf772665fa3e83fae2839227c6b3fbd8494a2319
-
Filesize
5KB
MD5c83d30ed6ad11445dd3af8246a78a998
SHA191680c2e174e64368f5be47f3708add834053bc4
SHA256428de0863fcb4644ccea32328954fee72848d2cdcc31952176f61504cf050f31
SHA51291d876de9834474ee4f30442702096708896dd9fc4e3c2de31075ce5c7435f66d77d5e3c6819288dc9e6463b9413043100fb797f12be1e955292582c0fa8056e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2