Resubmissions
23/02/2024, 05:24
240223-f3q2dsbg6v 723/02/2024, 05:22
240223-f21t7sbg5w 123/02/2024, 05:21
240223-f12p4sbg31 122/02/2024, 22:42
240222-2mqxcage55 122/02/2024, 22:37
240222-2kbpmsga2v 722/02/2024, 22:23
240222-2bae8afg7x 122/02/2024, 22:22
240222-2amzxsgc37 122/02/2024, 22:22
240222-2adfgsgc36 1Analysis
-
max time kernel
4s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 22:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.surveymonkey.com/tr/v1/te/akU_2BQc2vAhAsa_2B264x1g6_2FpF_2Fhy3EhxbpxJDHYpYZT3PErDK_2Bf6OjNYOPsqZdKwglxf8ItBG4dY0dbo_2FD4_2BnAFTmE4NULWit7rJ_2B16y65bYv88T28YgY40Z3aMRVm48nQ_2BM6P9ofedJKGtCx_2BHp0cJ3yq3JrIdtV0M0Q9hRgB3Du9XxCrredNccHa2HBP3y16VHuBJkjTbw5t_2FQEMIhu_2B_2B3o2o25WswmM1vjGdvyGsLNVkIb6bDFVcm8izAiPrHi
Resource
win7-20240220-en
General
-
Target
https://www.surveymonkey.com/tr/v1/te/akU_2BQc2vAhAsa_2B264x1g6_2FpF_2Fhy3EhxbpxJDHYpYZT3PErDK_2Bf6OjNYOPsqZdKwglxf8ItBG4dY0dbo_2FD4_2BnAFTmE4NULWit7rJ_2B16y65bYv88T28YgY40Z3aMRVm48nQ_2BM6P9ofedJKGtCx_2BHp0cJ3yq3JrIdtV0M0Q9hRgB3Du9XxCrredNccHa2HBP3y16VHuBJkjTbw5t_2FQEMIhu_2B_2B3o2o25WswmM1vjGdvyGsLNVkIb6bDFVcm8izAiPrHi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 chrome.exe 2192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1592 2192 chrome.exe 28 PID 2192 wrote to memory of 1592 2192 chrome.exe 28 PID 2192 wrote to memory of 1592 2192 chrome.exe 28 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2440 2192 chrome.exe 30 PID 2192 wrote to memory of 2592 2192 chrome.exe 31 PID 2192 wrote to memory of 2592 2192 chrome.exe 31 PID 2192 wrote to memory of 2592 2192 chrome.exe 31 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32 PID 2192 wrote to memory of 2692 2192 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.surveymonkey.com/tr/v1/te/akU_2BQc2vAhAsa_2B264x1g6_2FpF_2Fhy3EhxbpxJDHYpYZT3PErDK_2Bf6OjNYOPsqZdKwglxf8ItBG4dY0dbo_2FD4_2BnAFTmE4NULWit7rJ_2B16y65bYv88T28YgY40Z3aMRVm48nQ_2BM6P9ofedJKGtCx_2BHp0cJ3yq3JrIdtV0M0Q9hRgB3Du9XxCrredNccHa2HBP3y16VHuBJkjTbw5t_2FQEMIhu_2B_2B3o2o25WswmM1vjGdvyGsLNVkIb6bDFVcm8izAiPrHi1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73c9758,0x7fef73c9768,0x7fef73c97782⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:22⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1520 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2348 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1324 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:22⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3576 --field-trial-handle=1296,i,15650850797699633811,6409860423775844855,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c250cc7379c88ac41fc1a3373080a561
SHA1d4f018eaf9434c0cf2a4b65ea4d9627ffcf8fd2e
SHA256fad3e09386834b589945fb91d9b2168e1a576926b0e76238307c4cb7cda17bb2
SHA51293dc4de524ceb8096f33c9ea69a11e80241930269b2afa1c33aeea95fc558ad979b74b20ea8f567fb263c500a473f3a20e30a39750f85ef47c11264374271a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c3a374e9b201d580670de6bc608d7af
SHA1abcacbe73d3689cc31a3f3e1082fcf81a65342ad
SHA256610e999d771420acc4c7f862cb56e8a6f09dff5d8fc615c2dd31a0f462e3f968
SHA5125825516998db1be4fab8a778f77705c9c67c3739575bd117a714c182fe712aa2686a3ab7f4835260119f7dcd92566da1e10f157ef8b9e6c159087b58e0752bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db34c12c13ad22de3c23783680e0d041
SHA17a5270e20a9a323b793ac03c3589b3e48775182a
SHA2560d089f0040368f6759eb5f8ba15110dadf70db97abaa2d62452f3a5298a93b9d
SHA5128eb4dbc54a5a136d7c3ad8c3a6005cd57dc3a3cd7f3c765f0cc55f3ec3c2fd9a5bcd0ed0f1417451574c2b3f38508a45d907b5503ced492f61eb64f1d40e5362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b592fae62df5d4d1e26fce8709646d7
SHA106bc7cd6b53f98f64051c5b9d07854046a3070e4
SHA256968caba0e7e7256df5870e09052af53645c6961639038dcdc2f31af3fec2b15a
SHA51242fc48664c38085c1dd90396fe8de909d2ec14ebe20658493e6234b9826f0062b3bb5a6a61414ce2b312eb512f7c0a653ed1fc21e7c19bf03bde5979e6caac89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e8a052f4e71e871a86ec2636fd52ca
SHA16c63ab17e3fa93cb8884b2413ef2599a7ea1d6a9
SHA2566cc7d43d837f0b624215b16625431eb03ec2b4d937a71d895bae85f4c1ea4065
SHA512bfe6a3f48d02f7d8e7fe67a168b7a821fdb85f08d3fa004d761a6aab99437dd371fc83c379445f3137b3b223f4038091ec7f92449c802897c0fcd819377f0d88
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06