Analysis
-
max time kernel
37s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
microsoft.png
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
microsoft.png
Resource
win10v2004-20240226-en
General
-
Target
microsoft.png
-
Size
13KB
-
MD5
4fef2138c3784273ab531c44285616f6
-
SHA1
5431f64ffa998d566b7244589d3b2158e7602274
-
SHA256
d59716deee36f931bea2bda639265c7fcda81226cf135c45382dc59116bb7364
-
SHA512
9364e839158e61582067105e7c016d44337c8d05622f9fe2f1c928497cc0751a39a1ef2974a77b828b79ca93735e2b690b7ff7d679159c14f195ff698c93f636
-
SSDEEP
384:GqlR0+L5aN0d/ysW8LBx2IuJQvo10oajfC/aYWkeOm:ZQqe0/Bx2xV10oIMJ2Om
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3044 rundll32.exe 3044 rundll32.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2616 2524 chrome.exe 29 PID 2524 wrote to memory of 2616 2524 chrome.exe 29 PID 2524 wrote to memory of 2616 2524 chrome.exe 29 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2432 2524 chrome.exe 31 PID 2524 wrote to memory of 2480 2524 chrome.exe 32 PID 2524 wrote to memory of 2480 2524 chrome.exe 32 PID 2524 wrote to memory of 2480 2524 chrome.exe 32 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33 PID 2524 wrote to memory of 1768 2524 chrome.exe 33
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\microsoft.png1⤵
- Suspicious use of FindShellTrayWindow
PID:3044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef68f9758,0x7fef68f9768,0x7fef68f97782⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:22⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2136 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2192 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1436 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:22⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2352 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1944 --field-trial-handle=1416,i,9546691678953075131,212252463305003759,131072 /prefetch:12⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD554f3d26fd2485729c1582abf876aa461
SHA129a9ce59922a9195f08b4e717ef7682c407cc5e7
SHA2569a25459dee3abd85c94615a1565514fe095da4de2cab27f7595238274aba042a
SHA512527aca256c8abac8eca48ca9d80370c5d2d02567d1382f423a538077061d7d80a55d2365ec22d98c07ebce6a6f39351ee244566a4a6a3794160eceb5182eec1b
-
Filesize
168B
MD547f2145f5cb8ed8e37bcd2a06ff8c8e3
SHA1ea08e164421f21958b7b705c12aad4f8ed176f55
SHA25620727f7181aca5d439e50a20420a3a312cda46ef600b428fe78d67313febff6d
SHA51283cb30c3b4fc827b7041b24fdab06ec778072c07d96e25ba6973604f91886bfb30fc5cfd0431ed197a82da779eb102d228809783b153fda5a3446b22b85dda3d
-
Filesize
168B
MD5d54f121464b75e7349bec10cab840e4c
SHA13023b60a27ca7a433566bbb09a4eb03cc033851e
SHA2560be19a897cff9c6d03f7e354491c1e4410d50f949b35f68f8b5cce91721d9df5
SHA512cdce33e182ba39544ae56017d8efa369ea1389efc82cf4464c6d2cebe456acd961f12e8ea664b711511e9e8ed19ccd93c348617bde7872cada23a4d5c2865f34
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5b9b2deb33e2df725886caaf5a8553271
SHA1b2962703eeb04d26c470b746ebfba8c410d6bc1c
SHA256b95234a6a4357e21c789436faec70f722b80baf4e879dec2803ecc4c6cd0ca85
SHA5129a84a9658ab827412bbe6849aaf041e45cc91e750b91ec7926fef039a7dc1ac1844c3fedc8718dd5578c2781218a9ba1b01e1357e3d90587f58009911a7d0c6c
-
Filesize
361B
MD5fe8046f36735033863d62b3e5499437d
SHA12167d7b875bff569df043c9a7293a10ccbce2037
SHA256abb94e3edcbbe69fd4258a1c0cba6190ad5715511217e7c43b8349de0d449dad
SHA5128469179b3049a42358b9e2c3f3d2314da50c0c27245305b1686f53299ed5125b05b2f816942e0f9ea43e267c79abe0d9b0c0100e3678aa5075107f3f23544e29
-
Filesize
4KB
MD550b8516ea76f97cf9b721811d854d38f
SHA115ea47f76c27471c7b10fe4d4dbdbd325b230f98
SHA256d88297eb1ea03898dd1de612c967d4a5e45de82240241dccd34155a05fd2b0b9
SHA512435f9bb6ee88ce7aef8e7323e1ff937f133bd9364480fc57edc024003ef88d1dbeb57c1de9a2f57c2061cabd4ea95366621a7d0297462dff28979f7444fc9359
-
Filesize
4KB
MD5235abd0a40fe3f99723e66dda9777673
SHA17b2a6c5811e6df1b840d7bf857aee1a7297a4527
SHA2564d8b807e0a8cb9f102ff36a2a7d648d5de7954396e9201d027ee0dffc450be93
SHA5121af4a080ec0f85c04e241f1fe340db5c086e8d851bfa18d1d3e592840b7fbce7d6a0a6e88f1d1186041e1219f76d88790d208ede485b9b10cfe5ea23557d6b7c
-
Filesize
4KB
MD5deefd02a0e5b228e805535de59d2ba07
SHA1fa0b581fb6bd89dba9c091e853fd2af6eb53adc8
SHA2565b26006c49a637247e37b63a3e5045abfb887e3d6e0333bac58ef879945fc53d
SHA5129a7a1fd29fe555676a01958400ff0f9dcbaf3c4117f9f5520c9239b188ca1fc699e79a8724a38de17d8adf89c911a5b96937cd20bb75ca40214bdd8f258eab07
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2