Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
freddys.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
freddys.exe
Resource
win10v2004-20240221-en
General
-
Target
freddys.exe
-
Size
185KB
-
MD5
921803c1157e04bb865e11b957edf47c
-
SHA1
8875b553722d58faada81b32734c94ead1e18f32
-
SHA256
0054dd26f68c96ef9b221f0482585a8c4732e306e8d4dfc2fd9282ee2a60dce4
-
SHA512
c1a2e9ff35a5c3dadcf5cdc504174d1285b6289f10dc6931681b5c985a640d906203e0ffae3a8a003783f09a2e4745d6904e606afdc01722af97c2a2038446f2
-
SSDEEP
3072:SoGRzdzuQJQeVRaAut+cnvov/u4daebbd5cQClGXsD:c/l2eVFunAe3kulGa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 112 2760 chrome.exe 29 PID 2760 wrote to memory of 112 2760 chrome.exe 29 PID 2760 wrote to memory of 112 2760 chrome.exe 29 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2512 2760 chrome.exe 31 PID 2760 wrote to memory of 2596 2760 chrome.exe 32 PID 2760 wrote to memory of 2596 2760 chrome.exe 32 PID 2760 wrote to memory of 2596 2760 chrome.exe 32 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33 PID 2760 wrote to memory of 2472 2760 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\freddys.exe"C:\Users\Admin\AppData\Local\Temp\freddys.exe"1⤵PID:1284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6659758,0x7fef6659768,0x7fef66597782⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:22⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:12⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:22⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1424 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3988 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3928 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2656 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2680 --field-trial-handle=1200,i,9500341738414816008,6486597127319104997,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD53ed75c670f85994400befe466ee69fd0
SHA1c24c6fe4df214437a8132abf4fcd1c0c401107ec
SHA256188c6ebaa5c63e1cd87e0fb3ea7e7f07ba5a13d795979b17d64e20e28a041c98
SHA5120e68cc2903aa578c5995aecd64d37f52a34f5a8edb11b02270e06e635db5d80d2653c6ec39a5e3afdc3d10bb55a550032ee308198c5918fc6863c85a2e9c5b95
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5b8224f804c41906fa7aeda383d9fe469
SHA1a757d1501d7e2af1817a391231ff565f8103c232
SHA256fb0e7910c60485b3fbec97bac1cd774eff509aceef46e45d8862956f6012bc7a
SHA5123723a441f90f118a9d2cf27a170c12dec25081e33ddb5355662ad3998093cfc2d1175e577c386def4a5e6fef4830649b0160393377ce1812c4fdd58d7e785364
-
Filesize
4KB
MD53740771d6d46154caeaa2fba76982514
SHA183443113cc0874c8c377e93362d70860ad86564f
SHA2563fa50da4b33172d822cc9fd02906826d3a0db9eaae236d603dd50be0a724e197
SHA5121a1fa52b4743ebb48acc1d23a371803ac41c5fc30cbc4112f6cf5a1b78f796605b5589a8f8ede1358569d01c01f6dcc36592bb9024e0fe0c385463b05f087e0c
-
Filesize
4KB
MD50a80ba8587763bd4d34bd44209f47dea
SHA1ec8bbfac93c4a8109ce9388f577e4cc3776a8d5f
SHA2561e07be391b2c93df9fe227db04efa8ceb785be8775c2ae932d3892c17b784af1
SHA51271b8832f80e15a88f561019351c6a43a0a2706f6e87e9a164d8acaa92c1d8af4ce46d155439a2c9063d9f2b3a2f64c097bf524aca41a1b36289eb6b22e547941
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
256KB
MD5d7173175e5fad5a781bf0fa1c7a17012
SHA15e79ddfbd2411302512e73676ec0bf9e387d5ab3
SHA2562230b6e919a89fbee63c844cbfcc9528cd5dc73997b3eb87e3652408476acae4
SHA512061ccf23a53d8d5e09f1456e2d364001b7019532fe2af53b9cfbad812e226f67b19c263e2baa2f6cccec286ede3d39767f528fbb5630ec46a5a04d2a9bc78c65