Analysis
-
max time kernel
17s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Doc00345326636738.htm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Doc00345326636738.htm
Resource
win10v2004-20231215-en
General
-
Target
Doc00345326636738.htm
-
Size
8KB
-
MD5
1a4a90bd347b69e2315f8742d683ab4e
-
SHA1
342ccdc6b97210cde285ed51ffe58c65f84aedb5
-
SHA256
40bb611f407613934de1c7c06536546f27718d8aec26dfa27e7d6decf60d05a0
-
SHA512
aa4fdf17391090c43875cac7448161d64f1bfa0ecd2cd315c386765c09a8a6d3c5d79aaed02c59ec7e76003dbd2af4c478f5eff582cedd7cc97bd01cb9d81a0e
-
SSDEEP
48:IJwls5uSp1AJ+6Lh0Mrd5nn/STIps+UiSluwv6E35OUbIjU296ACUj6DDu:K3ZpovzowZbSlnRzaL3pN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2960 2204 chrome.exe 28 PID 2204 wrote to memory of 2960 2204 chrome.exe 28 PID 2204 wrote to memory of 2960 2204 chrome.exe 28 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2724 2204 chrome.exe 30 PID 2204 wrote to memory of 2844 2204 chrome.exe 31 PID 2204 wrote to memory of 2844 2204 chrome.exe 31 PID 2204 wrote to memory of 2844 2204 chrome.exe 31 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32 PID 2204 wrote to memory of 2644 2204 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Doc00345326636738.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d49758,0x7fef6d49768,0x7fef6d497782⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:22⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:82⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1304 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:22⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 --field-trial-handle=1292,i,17568188092259547514,14625005039984461441,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e228dbf5b9dda5ec8838cd2d57c2d76b
SHA1831c02fcb201827ba46b3f3c0a9f156470cba31a
SHA25657c68c2e93dbea349d46bca4ed78a9803b586c426438a7d5d6c895220350bd20
SHA51234502fa4491e06ee69378e31b7f3e29d8912fa3a5c7d18b89c70c6283b0d4890c3526f9eac4b3be252d9a6000daad8e1ef9df3c17290632374a3ff041a2c52ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e6db5592e653f6b62cdc7356242840
SHA17b712c1a8e8ec5042ec4c223dc473423f7c831cf
SHA2564eabec1d49c133872a10188f7f14986d6ff3f1943ddf3b9661efb6fee74ea7aa
SHA512ffd2869876d9e6b06cd6a91eccae9b512fc99e46c9a95e2580899b52fffb26f0a28c19283439fddc521100abceac7ac25f7fd44af2680972028c9db3fd215da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527f98ff733f2048b2e8b0308db36a42f
SHA1be9492c7203f37296b04f70b033ab2e032e9e7d8
SHA256b80e4ddfe1ec0df995eb2892308f467b11a055adb5017f4df71df9fff91fdab6
SHA5122e042f13eb8785f007ee124403164b53c62fae2ff9151686ffb72dbb1ad5e73fb52b40e0b83f8d78932c9ed39a6909a996932103f226cc4405afd259edacee1b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD58b8fe6cfc01cf9fadb2fd5bd118ff3de
SHA129d6b4a51b47d69048b9cce41d04e42d4e1f67a5
SHA2562f87a98ca2f5d19f0a711e85bf4602a7fb7ed083177612098e0798c698cf6f51
SHA512f5d2d63a22579428ac20ee8cff4aca92e0c150f71d3da75fae8d9cd666d573e8175418799b207de3c15ff6fc8a2b8ef5b175b42438922842a3006ca35996e26c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cf071132-ae59-4083-bd64-a908d4b88703.tmp
Filesize5KB
MD57540ec50fc577cbef6d47daeb84acd70
SHA1a82ec6b7182416b9d8e5a34f220db1b782442709
SHA25662a4a8cb90896d6bcd91bd05fd1e5b5f25ff729dfa5a6b40fb5bdaff80040ae4
SHA51266dc73d6e850087567ec3bb85f400c4e1b11e4a16df0573193ec53c18f7903d45e39390740cefd6ba0774a20fc46f74246e729738f7b9a8d1dfe93705bec5da2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06