Analysis
-
max time kernel
26s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
Resource
win10v2004-20231222-en
General
-
Target
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
-
Size
1.1MB
-
MD5
fc157bf81ab006d1bb0a542aaf499c53
-
SHA1
2b5f22ac2158a90eae8783e05e62171095bbdce7
-
SHA256
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909
-
SHA512
723f661b13ed7cc9444ba0c1038b2db23716bde32ef02f504131a4f11e5a23a9186ec527c0d9291f18194e7193d62687be1f2a5385ffa37d3b1ea95aaac2f8f8
-
SSDEEP
24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aHh2+b+HdiJUt:CTvC/MTQYxsWR7aHh2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1376 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 1212 wrote to memory of 1376 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 1212 wrote to memory of 1376 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 1212 wrote to memory of 1376 1212 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 1376 wrote to memory of 2280 1376 chrome.exe 29 PID 1376 wrote to memory of 2280 1376 chrome.exe 29 PID 1376 wrote to memory of 2280 1376 chrome.exe 29 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2576 1376 chrome.exe 31 PID 1376 wrote to memory of 2728 1376 chrome.exe 32 PID 1376 wrote to memory of 2728 1376 chrome.exe 32 PID 1376 wrote to memory of 2728 1376 chrome.exe 32 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33 PID 1376 wrote to memory of 2604 1376 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7169758,0x7fef7169768,0x7fef71697783⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:23⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:83⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:83⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:13⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2332 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:13⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1748 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:23⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3264 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:13⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3572 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:83⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3844 --field-trial-handle=1396,i,3433997802261362041,13276969057878081652,131072 /prefetch:83⤵PID:1680
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD50c492630290e95d0701ae9ca348d6910
SHA10a1bfbac340d86bc9a817f8b616a77f322334a96
SHA256fca6f80040e3e88896e2f6ad00c10b411f507d1be591ef41424bc01b50e4c60c
SHA51209d438b4aeea835f98bb04fc4a0e0b0a9b5c40767369b72d02ee87150d2d2b5accb4722f8fc7ee49a2e79c46557a0ca71d66bb579c7099580c99b2bad047106a
-
Filesize
363B
MD5ab703686f813c8561aa968dadd28146c
SHA17d41fe2fc692b95ca17e1d0581a79ec8413f96fd
SHA2560a3966672f499a628435f237ab577087d1fb073dd309aaa785c211e2a695fa53
SHA51205f4de8d40084ef70acc7dfe89266f6085b9bc7339cb7ffda6116a6c51f1bc99bf07c3bb17fbd54944e27cdd1994546f08b620d23a46900dc6eceadffe60c529
-
Filesize
5KB
MD52ef39a455aa9fb1b185b43f19d2575d6
SHA1774ec2a3d1efc61764247fe75469927620d5efb1
SHA2568ac8a8683613a9cae53f03ed912aea8f9e65e92641667ea08d7088eb9fd04d39
SHA5121b2e36db0e7f7bb236d2072a52736c121095fe2131e7a7d16e6e21ac9357536f6b1ee52b857a77f178383cd4c01e16255ca5f6b1e64154af38c3163dd071d77b
-
Filesize
5KB
MD5c5be97eae18b6d5cc7f32ad2c23da7a6
SHA15b3c210cf10bc5fb6f565c2d99ca43287e79b046
SHA256741fea3d71516a300f6eeb7690da534a008583bf9dfd695eff7f035175c78b86
SHA512659fb5687872470ee8e06a29b6d90b7dfa641ca725e4142ca766837532f90ec95a84d6642c95796b11f0cb48d3a1b870574dcc60ac63d00a5b600660188a73fe
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2