Analysis
-
max time kernel
75s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
sample.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.js
Resource
win10v2004-20240221-en
General
-
Target
sample.js
-
Size
86KB
-
MD5
03c273d44a6160481c3907e00ea4432b
-
SHA1
13380c227554dcf0b39cd226d2a725073ad88249
-
SHA256
3c919ab757d222e8aa3d4eb21c6d5f25a02db38fa7be75672aa11d711e818a63
-
SHA512
d4bc0fe665306b6ba28b58078a6ad3575de1073bfb04a3e5679f7bc38e2dde1c67b61b2be9dc0a0c6230cc8f4cb1a3f7b7aae8026074f3494110caea648030b2
-
SSDEEP
1536:dqhuYqLNkFYGu3QlU8KQkeSVN0NtseMcmbPYzIcj9:chuYq5kWQlicm8rj9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe 2536 Magnify.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 Magnify.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2536 2144 utilman.exe 30 PID 2144 wrote to memory of 2536 2144 utilman.exe 30 PID 2144 wrote to memory of 2536 2144 utilman.exe 30 PID 2452 wrote to memory of 2752 2452 chrome.exe 35 PID 2452 wrote to memory of 2752 2452 chrome.exe 35 PID 2452 wrote to memory of 2752 2452 chrome.exe 35 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2800 2452 chrome.exe 37 PID 2452 wrote to memory of 2816 2452 chrome.exe 38 PID 2452 wrote to memory of 2816 2452 chrome.exe 38 PID 2452 wrote to memory of 2816 2452 chrome.exe 38 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39 PID 2452 wrote to memory of 2692 2452 chrome.exe 39
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sample.js1⤵PID:2188
-
C:\Windows\system32\magnify.exe"C:\Windows\system32\magnify.exe"1⤵PID:2520
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\Magnify.exe"C:\Windows\System32\Magnify.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵PID:2040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7379758,0x7fef7379768,0x7fef73797782⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:22⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:82⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:22⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1188 --field-trial-handle=1272,i,17836685103800258139,3316526116729565020,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2680
-
C:\Program Files\Microsoft Games\minesweeper\minesweeper.exe"C:\Program Files\Microsoft Games\minesweeper\minesweeper.exe"1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD58c097dfe01a699b228f8fd4616331d07
SHA15b3c110f2e61ea45ae849e8e00bde165f717f838
SHA256b607739d864487e16d4357cbff13176c810fe42f587305c378c6631058fd5c8e
SHA512eef9b049daf68f1509911eca5a5793df180f79cddd2cf816ce2aa07aa924a48f370f45b68bd8c8e12090e8301d1fd13ef74924df270f9b1e922dc3c2d70c3763
-
Filesize
5KB
MD5be1aafb660cd7b782d296ae2cce7d9c6
SHA148ce07c13ec81c1f8b9abb850a9ad9c32084637e
SHA2569d68d26219ca5b9e683c10666cb5b6e3461c8586e5758cdbf99c1429dbb103bb
SHA512915dd38aab0babc41d9deafa3f25e794b8baf49a0c796993f87b4abef36eb0620e2b57e91cd1c22a5edf0406abc942effc249b3db4a8fcad8ac1f92288ef09d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}.gamestats
Filesize3KB
MD511b1cb66abbbe81e007ddd2959f6b068
SHA1f87a67ffe354b00cbb2f492701b6429762e9c87f
SHA256cb5314886a9d885e9d9df33497476223bd30ead81d8cd8ddb7a977bf15675184
SHA512efcba4aaddaea5e60c120811bf8e04664fea877b4fdf3559aac086a68ad679a8561d43b53a76ee6bef5d5ca8b4bd452a22082ed8a68a78ead7bde02b106230bb