Analysis
-
max time kernel
104s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
SETUP.exe
Resource
win10v2004-20231215-en
General
-
Target
SETUP.exe
-
Size
4.0MB
-
MD5
89b78996fe50e379044d2690ec8b70a2
-
SHA1
0d50f57958c721113e38b797b7d53a65ee64d19f
-
SHA256
a8e6e530ebe933f817b498fd9ceff902ad757bb23be2f9b9273e50762e4a7f27
-
SHA512
0ae28cfe4726ad2d254bb67cbd57fa2e9e0e78fffd85e3dc685872abb6725d3b0aa42c8ceea128316e060b105f700135935eada98cb68e3eca93ebd9076b7e7b
-
SSDEEP
98304:DSC2xOk6O2qK56tb605kPBtBFRFLOAkGkzdnEVomFHKnPW:DSDp65PBtBzFLOyomFHKnPW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133527030009369365" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 756 chrome.exe 756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3864 SETUP.exe 3864 SETUP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 4580 756 chrome.exe 96 PID 756 wrote to memory of 4580 756 chrome.exe 96 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 996 756 chrome.exe 97 PID 756 wrote to memory of 4832 756 chrome.exe 98 PID 756 wrote to memory of 4832 756 chrome.exe 98 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99 PID 756 wrote to memory of 4680 756 chrome.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\SETUP.exe"C:\Users\Admin\AppData\Local\Temp\SETUP.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:3864
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb654b9758,0x7ffb654b9768,0x7ffb654b97782⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:22⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:12⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5132 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1864,i,5439071393100423275,3295305478563674579,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50c41a9b415932f77b3347dd3d1121ae5
SHA13cf03c04a01479941254b7a49001fcdc07a8f7a5
SHA256612a47cfa0f668be971e35813fb728852c55a12afc2c7e14c3ad180d982de2e4
SHA5125d1d6971488f56a878d64e761980be2300c518bf214b27f9bb28707904fa1132f9431ead8968e9161f3d72e2596cdc9c67fefdb90070a8a8b6830c9841ecb4bb
-
Filesize
371B
MD5ba54482dbed2ab6feba21f5e0b69b7c6
SHA130be68c3e7f3381731e0ce3979ab76b0e074fe90
SHA2561a36ba25a5184093053f0338ce1c554497a760eb8c30683f090870c6187e629c
SHA5128887102f268eb5ed3d3cdb25f54b74f1034c027fe1bac183453d25dff44263438af79d368e1ab4e35ea1565327fde331d829c86efab65642287ae5067cf61e46
-
Filesize
6KB
MD55c5e51354f861223fa98e34b881461f5
SHA1a92ea6eef4c02165ae233259edec73760362f31b
SHA2567945bb688852b101606e15c4eafcfe2ac97fded81defee5d563c2e877d6ad89e
SHA5128d045f2f22a06929f57486b3932d22cc2eb567ca9bd7f87bc6897d8a1acaa12fac547d3eed6e74386030a04f00b66292c9253ac91c6a9424a1e4f97be812856f
-
Filesize
15KB
MD50cbe4a5b0093466c7dd35d78c9fe8f03
SHA1955a892f51e3185b85e008405ed3b41f2be8e77c
SHA25620bf579ab52d0b9407483371e71ab2eefb77dc04db07e3a4edbbebcb31e71048
SHA5123aad5eae20d7a82bcb45c67bb06ff03b391de7764cec248812431a9e745063db4523084e8071bc7e106c8d1f82a0f71e4404c066bf5378ff0bbbf3757d089d69
-
Filesize
240KB
MD5d6681f5d1774912ed4b4641cd298dc68
SHA15a9e0d34ddbdbf425f960f840695fe3054a997f3
SHA2562a7c01c61032d9e286390f533912bafa5285d201f489cc081661089d873c3662
SHA51232ee7287f0bca24c7580f272e1fa175c026cefa8dc3c774fa1baf2ff613fe5bb5dc551312a7e90c77aadbfea24a424690e8df63fade29a4cc138d00e4ecbce5e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd