Analysis
-
max time kernel
60s -
max time network
63s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/02/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
0day.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
0day.exe
Resource
win11-20240221-en
General
-
Target
0day.exe
-
Size
68KB
-
MD5
bfa550450cea14224885b0f0b740a6d2
-
SHA1
ec1db5f03676b38a5d75376948a7251c2d0fd9bd
-
SHA256
0ce864eb7ce80d4d8b26403edfee770d6727ac2aa74f5bde64f93b4f8fbe9e4e
-
SHA512
d3bacdec0824cf1359734713331a47a6b9185b82c0cf360dbf37a776b15ed463ebb8c267f184f42b4f3b2e0cf9a0f0983a3de8d0efb99cfcb827e60df7fc8725
-
SSDEEP
768:tbLiwyyqehg7RaQ3qUjBnJSMMOQxpAi9Hm:tniiq0gdYUjBEfxplm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe Token: SeShutdownPrivilege 1048 chrome.exe Token: SeCreatePagefilePrivilege 1048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3572 1048 chrome.exe 81 PID 1048 wrote to memory of 3572 1048 chrome.exe 81 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 504 1048 chrome.exe 83 PID 1048 wrote to memory of 4604 1048 chrome.exe 84 PID 1048 wrote to memory of 4604 1048 chrome.exe 84 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85 PID 1048 wrote to memory of 4236 1048 chrome.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0day.exe"C:\Users\Admin\AppData\Local\Temp\0day.exe"1⤵PID:4732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb8c29758,0x7ffcb8c29768,0x7ffcb8c297782⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:22⤵PID:504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:12⤵PID:496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5084 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:82⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5148 --field-trial-handle=1812,i,13274237495695291036,10590578588842621901,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369B
MD5c4b6ed687640f2e15946b3a8a8cb5a76
SHA1167d92d03a18b4591be6eab4f190f909ee255fe2
SHA2562bd368b8e0ab5642d754975272334331c966fa48f8d525605b2743645ed0063c
SHA5123d5808e7711533aad90b5598fc94b246bcba505463d77a2a77f519faff87b4b7a70c1d1eb07cba92f539f3509c6029527614c1b20a45616a1159ff7732aa8dd1
-
Filesize
6KB
MD5869811a78b7ed6920652a01beea930ed
SHA10fefb0adad7523350e3601bed3c50aa17cd7b4da
SHA256741cc9f85bc182f76fac97245129b483108c86356d0e1e7dd8fec5991f7aae3a
SHA51293284c4682fdc860c65651cdea86902e4943c6d6a22ce44f2249e1a30fb513c309b8a1191683e1802242c10e46e44109e0c0602c6d291e82d81d3447c9a10889
-
Filesize
256KB
MD5b6682e9f9870ff25a1a9196b54f22b02
SHA161456bbf045d84fe42bae2e44d8b13fa95e3af0c
SHA2567495143d4edcae549468fc29fbb1047af6310fe49de585c339b80c943e350437
SHA512ab6b6456f4f14675e2a19ade885546feefb2f32221d799a7d2231d7ad2e529a6c719b2f58756127350140eb9af6209cfc05c62c7edc8a0007e82661a1135ca60
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd